Sciweavers

60 search results - page 9 / 12
» nsdi 2008
Sort
View
NSDI
2008
14 years 1 months ago
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
While the web provides information and services that enrich our lives in many ways, it has also become the primary vehicle for delivering malware. Once infected with web-based mal...
Michalis Polychronakis, Niels Provos
NSDI
2008
14 years 1 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
NSDI
2008
14 years 1 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
NSDI
2008
14 years 1 months ago
cSamp: A System for Network-Wide Flow Monitoring
Critical network management applications increasingly demand fine-grained flow level measurements. However, current flow monitoring solutions are inadequate for many of these appl...
Vyas Sekar, Michael K. Reiter, Walter Willinger, H...
NSDI
2008
14 years 1 months ago
Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services
Energy consumption in hosting Internet services is becoming a pressing issue as these services scale up. Dynamic server provisioning techniques are effective in turning off unnece...
Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas...