131
click to vote
USS
15 years 2 months ago
2004
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
128
Voted
USS
15 years 2 months ago
2004
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators...
123
Voted
USS
15 years 2 months ago
2004
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
111
Voted
USS
15 years 2 months ago
2004
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
104
Voted
USS
15 years 2 months ago
2004
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
|