Sciweavers

62 search results - page 8 / 13
» Eclipse Attacks on Overlay Networks: Threats and Defenses
Sort
View
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
15 years 5 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
APPINF
2003
15 years 1 months ago
Design of an Autonomous Anti-DDoS (A2D2) Network
– The threat of DDoS attack are mainly directed at home and SOHO network that lacks the incentive, expertise, and financial means to defend themselves. This paper proposes an Aut...
Angela Cearns, C. Edward Chow
IFIPTM
2009
127views Management» more  IFIPTM 2009»
14 years 9 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
DSN
2008
IEEE
15 years 6 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...
149
Voted
DASC
2006
IEEE
15 years 5 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...