Sciweavers

483 search results - page 14 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ICWS
2007
IEEE
14 years 11 months ago
Web Services Methods for Communication over IP
In this paper, we study web services methods and approaches to enable real-time communication services over IP. This approach extends web services methodologies from service integ...
Wu Chou, Li Li, Feng Liu
TISSEC
2002
123views more  TISSEC 2002»
14 years 9 months ago
An algebraic approach to IP traceback
We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback problem) during a denial of service attack. Previous so...
Drew Dean, Matthew K. Franklin, Adam Stubblefield
78
Voted
ACSAC
2006
IEEE
15 years 1 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
88
Voted
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
CORR
2010
Springer
115views Education» more  CORR 2010»
14 years 6 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...