The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
Enhanced EDoS-shield for mitigating EDoS attacks originating from spoofed IP addresses
Cloud computing has become one of the fastest growing segments in IT industry. A cloud
introduces resource-rich computing platforms, where adopters are charged based on the …
introduces resource-rich computing platforms, where adopters are charged based on the …
Predicting and tracking internet path changes
This paper investigates to what extent it is possible to use traceroute-style probing for
accurately tracking Internet path changes. When the number of paths is large, the usual …
accurately tracking Internet path changes. When the number of paths is large, the usual …
Leveraging internet background radiation for opportunistic network analysis
For more than a decade, unsolicited traffic sent to unused regions of the address space has
provided valuable insight into malicious Internet activities. In this paper, we explore the utility …
provided valuable insight into malicious Internet activities. In this paper, we explore the utility …
Path persistence in the cloud: A study of the effects of inter-region traffic engineering in a large cloud provider's network
A commonly held belief is that traffic engineering and routing changes are infrequent.
However, based on our measurements over a number of years of traffic between data …
However, based on our measurements over a number of years of traffic between data …
Bgp-multipath routing in the internet
BGP-Multipath (BGP-M) is a multipath routing technique for load balancing. Distinct from
other techniques deployed at a router inside an Autonomous System (AS), BGP-M is …
other techniques deployed at a router inside an Autonomous System (AS), BGP-M is …
CryptoScan: A secured scan chain architecture
D Mukhopadhyay, S Banerjee… - 14th Asian Test …, 2005 - ieeexplore.ieee.org
Scan based testing is a powerful and popular test technique. However the scan chain can
be used by an attacker to decipher the cryptogram. The present paper shows such a side …
be used by an attacker to decipher the cryptogram. The present paper shows such a side …
Secure and scalable fault localization under dynamic traffic patterns
Compromised and misconfigured routers are a well-known problem in ISP and enterprise
networks. Data-plane fault localization (FL) aims to identify faulty links of compromised and …
networks. Data-plane fault localization (FL) aims to identify faulty links of compromised and …