Sciweavers

CCR
2007
119views more  CCR 2007»
13 years 4 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spoo...
Felipe Huici, Mark Handley
PET
2010
Springer
13 years 8 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
SIGCOMM
2000
ACM
13 years 8 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
WETICE
2002
IEEE
13 years 9 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler
RTSS
2003
IEEE
13 years 9 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
13 years 10 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
13 years 11 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ICICS
2009
Springer
13 years 11 months ago
Denial-of-Service Attacks on Host-Based Generic Unpackers
With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without speci...
Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu...