Sciweavers

Share
TMA
2010
Springer
150views Management» more  TMA 2010»
9 years 7 days ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
TON
2008
108views more  TON 2008»
9 years 1 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
CN
2007
80views more  CN 2007»
9 years 2 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CORR
2010
Springer
175views Education» more  CORR 2010»
9 years 2 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
IMC
2007
ACM
9 years 3 months ago
The web is smaller than it seems
The Web has grown beyond anybody’s imagination. While significant research has been devoted to understanding aspects of the Web from the perspective of the documents that compr...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
CCS
2008
ACM
9 years 4 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
DSN
2004
IEEE
9 years 6 months ago
HOURS: Achieving DoS Resilience in an Open Service Hierarchy
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
DEBS
2007
ACM
9 years 6 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
ICICS
2001
Springer
9 years 6 months ago
Quantifying Network Denial of Service: A Location Service Case Study
Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this p...
Yan Chen, Adam W. Bargteil, David Bindel, Randy H....
ACSAC
2002
IEEE
9 years 7 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
books