Sciweavers

642 search results - page 7 / 129
» Detecting Spoofed Packets
Sort
View
ACSAC
2009
IEEE
15 years 3 months ago
RAD: Reflector Attack Defense Using Message Authentication Codes
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate s...
Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Pe...
CONEXT
2008
ACM
15 years 1 months ago
Packet doppler: network monitoring using packet shift detection
Due to recent large-scale deployments of delay and losssensitive applications, there are increasingly stringent demands on the monitoring of service level agreement metrics. Altho...
Tongqing Qiu, Jian Ni, Hao Wang, Nan Hua, Yang Ric...
CISS
2007
IEEE
15 years 6 months ago
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
— The problem of detecting encrypted information flows using timing information is considered. An information flow consists of both information-carrying packets and irrelevant ...
Ting He, Lang Tong
CEC
2007
IEEE
15 years 6 months ago
A genetic algorithm for solving the binning problem in networked applications detection
Network administrators need a tool that detects the kind of applications running on their networks, in order to allocate resources and enforce security policies. Previous work sho...
Maxim Shevertalov, Edward Stehle, Spiros Mancoridi...
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 5 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao