Sciweavers

25 search results - page 3 / 5
» Mayday: Distributed Filtering for Internet Services
Sort
View
WWW
2007
ACM
14 years 6 months ago
Modeling user behavior in recommender systems based on maximum entropy
We propose a model for user purchase behavior in online stores that provide recommendation services. We model the purchase probability given recommendations for each user based on...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
JSAC
2006
105views more  JSAC 2006»
13 years 5 months ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song
USS
2004
13 years 7 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
ICC
2007
IEEE
113views Communications» more  ICC 2007»
13 years 12 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
DEBS
2007
ACM
13 years 9 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...