Sciweavers

642 search results - page 51 / 129
» Detecting Spoofed Packets
Sort
View
JDFP
2008
81views more  JDFP 2008»
15 years 4 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ICOIN
2007
Springer
15 years 10 months ago
On the Use of Manchester Violation Test in Detecting Collision
Smart devices in the ubiquitous computing environment implement service/device discovery protocol that helps discovering each other and the services provided. As client device may ...
Yee-Loo Foo, Hiroyuki Morikawa
142
Voted
ITIIS
2008
110views more  ITIIS 2008»
15 years 4 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh
149
Voted
SAINT
2007
IEEE
15 years 11 months ago
SPRED: Active Queue Management Mechanism for Wide-Area Networks
AQM (Active Queue Management) mechanism is a congestion control mechanism at a router for controlling the number of packets in the router’s buffer by actively discarding an arri...
Hiroyuki Ohsaki, Hideyuki Yamamoto, Makoto Imase
INFOCOM
2010
IEEE
15 years 3 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya