Sciweavers

642 search results - page 118 / 129
» Detecting Spoofed Packets
Sort
View
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 3 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
CONEXT
2008
ACM
15 years 1 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
EUC
2008
Springer
15 years 1 months ago
Design and Analysis of a Stable Queue Control Scheme for the Internet
The recently proposed Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and ...
Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang,...
SERVICES
2010
123views more  SERVICES 2010»
15 years 1 months ago
Testbeds for Emulating Dependability Issues of Mobile Web Services
Today's ubiquitous internet access has opened new opportunities for mobile workers. By using portable devices, the workers are not only able to access their company's dat...
Lukasz Juszczyk, Schahram Dustdar
HPN
1998
15 years 1 months ago
A Connectionless Approach to Providing QoS in IP Networks
: The attempt to provide QoS in IP networks has raised some interesting questions on how a service can be provided to meet the application requirements while obeying the network re...
Biswajit Nandy, Nabil Seddigh, A. S. J. Chapman, J...