Sciweavers

382 search results - page 1 / 77
» Tracing Network Attacks to Their Sources
Sort
View
INTERNET
2002
107views more  INTERNET 2002»
13 years 4 months ago
Tracing Network Attacks to Their Sources
Tatsuya Baba, Shigeyuki Matsuda
LISA
2000
13 years 6 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
JDCTA
2010
139views more  JDCTA 2010»
12 years 11 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
EUROSEC
2009
ACM
13 years 11 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ACSAC
2008
IEEE
13 years 11 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh