Sciweavers

COMPSEC
2006
110views more  COMPSEC 2006»
13 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 4 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
DFN
2003
13 years 5 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
HOTOS
2009
IEEE
13 years 8 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
LCN
1999
IEEE
13 years 8 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
ITCC
2002
IEEE
13 years 9 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
ISCC
2002
IEEE
132views Communications» more  ISCC 2002»
13 years 9 months ago
An active network approach to virtual private networks
Virtual Private Networks (VPN) represent, in today’s Internet, one of the most interesting applications. This is due both to their usefulness in corporate network scenarios and ...
R. Maresca, Maurizio D'Arienzo, Marcello Esposito,...
FTDCS
2003
IEEE
13 years 9 months ago
Service Provisioning and Management in Virtual Private Active Networks
Service providers have been motivated to develop and offer new services to their customers. The key question is what kind of futuristic and practical services customers need. This...
Fábio Luciano Verdi, Edmundo R. M. Madeira
GLOBECOM
2007
IEEE
13 years 10 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
ICC
2009
IEEE
107views Communications» more  ICC 2009»
13 years 11 months ago
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...