Sciweavers

642 search results - page 84 / 129
» Detecting Spoofed Packets
Sort
View
TNC
2004
120views Education» more  TNC 2004»
15 years 6 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
IMC
2004
ACM
15 years 10 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 11 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
ACSC
2004
IEEE
15 years 8 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
SPRINGSIM
2007
15 years 6 months ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer