Sciweavers

642 search results - page 82 / 129
» Detecting Spoofed Packets
Sort
View
175
Voted
GLOBECOM
2010
IEEE
15 years 2 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
INFOCOM
2009
IEEE
15 years 11 months ago
Failure Control in Multipath Route Tracing
—Traceroute is widely used to report the path packets take between two internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption – that ...
Darryl Veitch, Brice Augustin, Renata Teixeira, Ti...
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 11 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 11 months ago
Stochastic RED and Its Applications
Abstract— In this paper, we present a novel fair queue management algorithm called Stochastic RED (StoRED), inspired by the well known stochastic fair queuing and based on the ra...
Shan Chen, Zhen Zhou, Brahim Bensaou
ACSAC
2006
IEEE
15 years 11 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha