Sciweavers

DISCEX
2003
IEEE
13 years 9 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
DISCEX
2003
IEEE
13 years 9 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
DISCEX
2003
IEEE
13 years 9 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
DISCEX
2003
IEEE
13 years 9 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...
DISCEX
2003
IEEE
13 years 9 months ago
TetherNet Anti-NAT - Secure Internet Subnet Rental System
1 TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT...
Joseph D. Touch, Lars Eggert, Yu-Shun Wang
DISCEX
2003
IEEE
13 years 9 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
DISCEX
2003
IEEE
13 years 9 months ago
An Integrated Cyber Panel System
The DARPA Cyber Panel program has funded research in defending mission-critical information systems from strategic coordinated attacks. This research spans many areas including no...
Laura Tinnel, O. Sami Saydjari, Joshua W. Haines
DISCEX
2003
IEEE
13 years 9 months ago
ANON: An IP-Layer Anonymizing Infrastructure
This exhibition demonstrates an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anon...
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Br...
DISCEX
2003
IEEE
13 years 9 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt