Sciweavers

95 search results - page 2 / 19
» ccr 2004
Sort
View
CCR
2004
45views more  CCR 2004»
13 years 4 months ago
Observations of IPv6 traffic on a 6to4 relay
FUNET has been operating a public, globally-used 6to4 (RFC 3056)
Pekka Savola
CCR
2004
76views more  CCR 2004»
13 years 4 months ago
Practical, distributed network coordinates
Russ Cox, Frank Dabek, M. Frans Kaashoek, Jinyang ...
CCR
2004
110views more  CCR 2004»
13 years 4 months ago
Analysis of long duration traces
This paper introduces a new set of long duration captures of Internet traffic headers. The capture is being performed on a continuous on-going basis and is approaching a year in d...
Richard Nelson, Daniel Lawson, Perry Lorier
CCR
2004
94views more  CCR 2004»
13 years 4 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
CCR
2004
106views more  CCR 2004»
13 years 4 months ago
Beware of BGP attacks
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...
Ola Nordström, Constantinos Dovrolis