Sciweavers

27 search results - page 5 / 6
» Implementing a General-Purpose Edge Router
Sort
View
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
13 years 9 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
INFOCOM
2006
IEEE
13 years 11 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
SIGOPSE
2004
ACM
13 years 11 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
INFOCOM
2006
IEEE
13 years 11 months ago
Dual-Resource TCP/AQM for Processing-Constrained Networks
— This paper examines congestion control issues for TCP flows that require in-network processing on the fly in network elements such as gateways, proxies, firewalls and even r...
Minsu Shin, Song Chong, Injong Rhee
PE
2008
Springer
173views Optimization» more  PE 2008»
13 years 5 months ago
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach
The DiffServ architecture has been proposed as a scalable approach for upgrading the Internet, adding service differentiation functionalities. However, several aspects of this arc...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...