Sciweavers

IMC
2004
ACM
13 years 9 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
CEAS
2005
Springer
13 years 9 months ago
Experiences with Greylisting
Greylisting temporarily rejects mail from unknown sources on the theory that real mailers will retry while spamware won’t. I outline a taxonomy of greylisters and report some st...
John R. Levine
ICDCS
2005
IEEE
13 years 10 months ago
ZAL: Zero-Maintenance Address Allocation in Mobile Wireless Ad Hoc Networks
— The allocation of IP addresses in hybrid wireless networks is one of the most critical issues in all-IP converged wireless networks. The reason is that centralized IP address a...
Zhihua Hu, Baochun Li
NETGAMES
2006
ACM
13 years 10 months ago
Post-game estimation of game client RTT and hop count distributions
In first person shooter (FPS) games the round trip time (RTT) (delay, or ‘lag’) between a client and server is an important criterion for players when deciding which server to ...
Grenville J. Armitage, Carl Javier, Sebastian Zand...
PAM
2007
Springer
13 years 10 months ago
Investigating the Imprecision of IP Block-Based Geolocation
The lack of adoption of a DNS-based geographic location service as proposed in RFC 1876 has lead to the deployment of alternative ways to locate Internet hosts. The two main altern...
Bamba Gueye, Steve Uhlig, Serge Fdida
CCS
2007
ACM
13 years 10 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
13 years 10 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood
SAINT
2008
IEEE
13 years 10 months ago
Bootstrapping of Peer-to-Peer Networks
In this paper, we present the first heuristic for fully distributed bootstrapping of peer-to-peer networks. Our heuristic generates a stream of promising IP addresses to be probe...
Chris GauthierDickey, Christian Grothoff
SIGCOMM
2009
ACM
13 years 10 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
IMC
2009
ACM
13 years 10 months ago
Where's that phone?: geolocating IP addresses on 3G networks
Cell phones connected to high-speed 3G networks constitute an increasingly important class of clients on the Internet. From the viewpoint of the servers they connect to, such devi...
Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ra...