Sciweavers

22 search results - page 1 / 5
» Tracing E-mail Headers
Sort
View
AUSFORENSICS
2004
13 years 6 months ago
Tracing E-mail Headers
Marwan Al-Zarouni
CCR
2004
110views more  CCR 2004»
13 years 4 months ago
Analysis of long duration traces
This paper introduces a new set of long duration captures of Internet traffic headers. The capture is being performed on a continuous on-going basis and is approaching a year in d...
Richard Nelson, Daniel Lawson, Perry Lorier
SIGCOMM
2003
ACM
13 years 10 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
CCR
2006
116views more  CCR 2006»
13 years 4 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee