Sciweavers

642 search results - page 76 / 129
» Detecting Spoofed Packets
Sort
View
139
Voted
ESORICS
2006
Springer
15 years 8 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
147
Voted
ICASSP
2010
IEEE
15 years 5 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
TSP
2010
14 years 11 months ago
A non-iterative technique for phase noise ICI mitigation in packet-based OFDM systems
In this paper, a practical approach for detecting packet-based orthogonal frequency division multiplexing (OFDM) signals in the presence of phase noise is presented. An OFDM packe...
Payam Rabiei, Won Namgoong, Naofal Al-Dhahir
INFOCOM
2011
IEEE
14 years 8 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
IPCCC
2006
IEEE
15 years 11 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya