Sciweavers

642 search results - page 8 / 129
» Detecting Spoofed Packets
Sort
View
ISPA
2004
Springer
15 years 5 months ago
A Novel Technique for Detecting DDoS Attacks at Its Early Stage
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
Bin Xiao, Wei Chen, Yanxiang He
SIGCOMM
2012
ACM
13 years 2 months ago
SP4: scalable programmable packet processing platform
We propose the demonstration of SP4, a software-based programmable packet processing platform that supports (1) stateful packet processing useful for analyzing traffic flows wit...
Harjot Gill, Dong Lin, Lohit Sarna, Robert Mead, K...
SOUPS
2006
ACM
15 years 5 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
IJSN
2007
82views more  IJSN 2007»
14 years 11 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
TON
2008
75views more  TON 2008»
14 years 11 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson