Sciweavers

2951 search results - page 12 / 591
» Secure Distributed DNS
Sort
View
110
Voted
NDSS
2008
IEEE
15 years 9 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
NSDI
2004
15 years 4 months ago
Untangling the Web from DNS
The Web relies on the Domain Name System (DNS) to resolve the hostname portion of URLs into IP addresses. This marriage-of-convenience enabled the Web's meteoric rise, but th...
Michael Walfish, Hari Balakrishnan
155
Voted
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 6 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
98
Voted
ICDCS
2006
IEEE
15 years 8 months ago
Spoof Detection for Preventing DoS Attacks against DNS Servers
Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh
133
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...