Participatory sensing

JA Burke, D Estrin, M Hansen, A Parker… - 2006 - escholarship.org
This paper introduces the concept of participatory sensing, which tasks everyday mobile
devices, such as cellular phones, to form interactive, participatory sensor networks that …

[PDF][PDF] Profiling and Clustering Internet Hosts.

S Wei, J Mirkovic, E Kissel - DMIN, 2006 - isi.edu
Identifying groups of Internet hosts with a similar behavior is very useful for many
applications of Internet security control, such as DDoS defense, worm and virus detection …

Ranking-based optimal resource allocation in peer-to-peer networks

Y Yan, A El-Atawy, E Al-Shaer - IEEE INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
This paper presents a theoretic framework of optimal resource allocation and admission
control for peer-to-peer networks. Peer's behavioral rankings are incorporated into the …

Wireless urban sensing systems

M Srivastava, M Hansen, J Burke, A Parker, S Reddy… - 2006 - escholarship.org
The creation over the past decade of unanticipated applications of the Internet, such as web
services, peer-to-peer file sharing, networked gaming, podcasting, and voice telephony, is …

Building accountability into the future Internet

J Mirkovic, P Reiher - 2008 4th Workshop on Secure Network …, 2008 - ieeexplore.ieee.org
This paper proposes a future Internet architecture whose security foundations prevent
todaypsilas major threats-IP spoofing, distributed denial-of-service attacks, distributed …

[PDF][PDF] Fighting coordinated attackers with cross-organizational information sharing

M Allman, E Blanton, V Paxson, S Shenker - IRVINE IS BURNING, 2006 - Citeseer
In this paper we propose an architecture for using crossorganization information sharing to
identify members of a group of hosts enslaved for malicious purposes on the Internet. We …

Primed: community-of-interest-based ddos mitigation

P Verkaik, O Spatscheck, J Van der Merwe… - Proceedings of the …, 2006 - dl.acm.org
Most existing distributed denial-of-service (DDoS) mitigation proposals are reactive in
nature, ie, they are deployed to limit the damage caused by attacks after they are detected …

Rendering unto cæsar the things that are cæsar's: Complex trust models and human understanding

S Marsh, A Basu, N Dwyer - Trust Management VI: 6th IFIP WG 11.11 …, 2012 - Springer
In this position paper we examine some of the aspects of trust models, deployment, use and
'misuse,'and present a manifesto for the application of computational trust in sociotechnical …

On the resilience of network-based moving target defense techniques against host profiling attacks

M Piskozub, R Spolaor, M Conti… - Proceedings of the 6th …, 2019 - dl.acm.org
Researchers propose Moving Target Defense (MTD) strategies for networking
infrastructures as a countermeasure to impede attackers from identifying and exploiting …

Viable network intrusion detection in high-performance environments

R Sommer - 2005 - mediatum.ub.tum.de
Network intrusion detection systems (NIDS) continuously monitor network traffic for
malicious activity, raising alerts when they detect attacks. However, high-performance Gbps …