Sciweavers

2503 search results - page 72 / 501
» Building Computer Network Attacks
Sort
View
NDSS
1997
IEEE
15 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
NSDI
2010
14 years 11 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
NDSS
2002
IEEE
15 years 2 months ago
Implementing Pushback: Router-Based Defense Against DDoS Attacks
Pushback is a mechanism for defending against distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congest...
John Ioannidis, Steven M. Bellovin
WEBNET
2001
14 years 11 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...