Sciweavers

4 search results - page 1 / 1
» Automatically Segregating Greedy and Malicious Internet Flow...
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
13 years 11 months ago
Automatically Segregating Greedy and Malicious Internet Flows
— In the current Internet, compliance with TCP congestion control rules is voluntary. Noncompliant flows can gain unfair performance advantages or deny service to other flows. ...
José Carlos Brustoloni, Shuo Chen
ICC
2007
IEEE
113views Communications» more  ICC 2007»
13 years 11 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
CCS
2009
ACM
14 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
USS
2004
13 years 6 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp