Sciweavers

9 search results - page 1 / 2
» Reconstruction of malicious internet flows
Sort
View
IWCMC
2010
ACM
13 years 10 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
ICC
2007
IEEE
111views Communications» more  ICC 2007»
13 years 11 months ago
Automatically Segregating Greedy and Malicious Internet Flows
— In the current Internet, compliance with TCP congestion control rules is voluntary. Noncompliant flows can gain unfair performance advantages or deny service to other flows. ...
José Carlos Brustoloni, Shuo Chen
ICC
2007
IEEE
113views Communications» more  ICC 2007»
13 years 11 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
IMC
2005
ACM
13 years 10 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
13 years 11 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...