Sciweavers

507 search results - page 39 / 102
» Attacking DDoS at the Source
Sort
View
CCR
2010
100views more  CCR 2010»
14 years 9 months ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
NOMS
2008
IEEE
15 years 4 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
INFOCOM
2002
IEEE
15 years 2 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ICC
2011
IEEE
206views Communications» more  ICC 2011»
13 years 9 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
59
Voted
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 3 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...