Sciweavers

382 search results - page 3 / 77
» Tracing Network Attacks to Their Sources
Sort
View
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 5 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
CSREASAM
2006
13 years 7 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
INFOCOM
2002
IEEE
13 years 11 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
APNOMS
2006
Springer
13 years 10 months ago
Tracing the True Source of an IPv6 Datagram Using Policy Based Management System
Syed Obaid Amin, Choong Seon Hong, Ki Young Kim