Sciweavers

337 search results - page 14 / 68
» Attack Resiliency of Network Topologies
Sort
View
ICNP
2006
IEEE
15 years 4 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
ICC
2007
IEEE
15 years 5 months ago
Weighted Fairness in Resilient Packet Rings
— The IEEE 802.17 is a standardized ring topology network architecture, called the Resilient Packet Ring (RPR), to be used mainly in metropolitan and wide area networks. This pap...
Mete Yilmaz, Nirwan Ansari
LCN
2007
IEEE
15 years 5 months ago
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
Abstract— Black Hole Attacks are a serious threat to communication in tactical MANETs. In this work we present TOGBAD a new centralised approach, using topology graphs to identif...
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Ma...
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
14 years 8 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
CCR
2008
91views more  CCR 2008»
14 years 10 months ago
UFO: a resilient layered routing architecture
Conventional wisdom has held that routing protocols cannot achieve both scalability and high availability. Despite scaling relatively well, today's Internet routing system do...
Yaping Zhu, Andy C. Bavier, Nick Feamster, Sampath...