Sciweavers

2503 search results - page 107 / 501
» Building Computer Network Attacks
Sort
View
NDSS
2007
IEEE
15 years 4 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
DSN
2005
IEEE
15 years 3 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...
DSN
2004
IEEE
15 years 1 months ago
HOURS: Achieving DoS Resilience in an Open Service Hierarchy
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This pap...
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zh...
PC
2010
111views Management» more  PC 2010»
14 years 8 months ago
Reducing complexity in tree-like computer interconnection networks
The fat-tree is one of the topologies most widely used to build high-performance parallel computers. However, they are expensive and difficult to build. In this paper we propose t...
Javier Navaridas, José Miguel-Alonso, Franc...
SPAA
2006
ACM
15 years 3 months ago
Symmetric network computation
We introduce a simple new model of distributed computation — finite-state symmetric graph automata (FSSGA) — which captures the qualitative properties common to fault-toleran...
David Pritchard, Santosh Vempala