Sciweavers

897 search results - page 88 / 180
» History-based traffic control
Sort
View
AINA
2006
IEEE
15 years 3 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
WICON
2008
15 years 19 days ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
MASCOTS
2001
15 years 18 days ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 5 months ago
Optimal Bandwidth Provision at WiMAX MAC Service Access Point on Uplink Direction
—In this paper, the IEEE 802.16 protocol is investigated with respect to the bandwidth provision problem arising at the Medium Access Control (MAC) layer. The aim is to optimally...
Mario Marchese, Maurizio Mongelli
ICCCN
2007
IEEE
15 years 5 months ago
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
Amey Shevtekar, Nirwan Ansari