Sciweavers

18 search results - page 3 / 4
» Network-aware behavior clustering of Internet end hosts
Sort
View
IMC
2007
ACM
13 years 6 months ago
Using uncleanliness to predict future botnet addresses
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations...
M. Patrick Collins, Timothy J. Shimeall, Sidney Fa...
WCW
2004
Springer
13 years 10 months ago
FatNemo: Building a Resilient Multi-source Multicast Fat-Tree
This paper proposes the idea of emulating fat-trees in overlays for multi-source multicast applications. Fat-trees are like real trees in that their branches become thicker the clo...
Stefan Birrer, Dong Lu, Fabián E. Bustamant...
INFOCOM
2002
IEEE
13 years 10 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
USITS
2003
13 years 6 months ago
Model-Based Resource Provisioning in a Web Service Utility
Internet service utilities host multiple server applications on a shared server cluster. A key challenge for these systems is to provision shared resources on demand to meet servi...
Ronald P. Doyle, Jeffrey S. Chase, Omer M. Asad, W...
CLUSTER
2002
IEEE
13 years 4 months ago
Location Selection for Active Services
Active services are application-specified programs that are executed inside the network. The location where the active service is executed plays an important role. The dynamic beha...
Roger Karrer, Thomas R. Gross