Sciweavers

1447 search results - page 213 / 290
» Simulating Internet Worms
Sort
View
INFOCOM
2002
IEEE
15 years 4 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
INFOCOM
2002
IEEE
15 years 4 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
ISCC
2002
IEEE
144views Communications» more  ISCC 2002»
15 years 4 months ago
A hierarchical distributed protocol for MPLS path creation
Network service provisioning involves the control of network resources through signaling, routing and management protocols that achieve Quality of Service and Traffic Engineering ...
Mohamed El-Darieby, Dorina C. Petriu, Jerry Rolia
ITCC
2002
IEEE
15 years 4 months ago
The Object Behavior of Java Object-Oriented Database Management Systems
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...
ICOIN
2001
Springer
15 years 4 months ago
Performance Analysis of QoS Routing with Network Dependant Delay Cost
This paper investigates the problem of path calcul ation of multiple metric routing. Toda ’s Internet routing is based on a single metric path selecting algorithm. Single metric...
Hahnearl Jeon, Sung-Dae Kim, Young Joon Kim, Hyung...