Practical network support for IP traceback

S Savage, D Wetherall, A Karlin… - Proceedings of the …, 2000 - dl.acm.org
This paper describes a technique for tracing anonymous packet flooding attacks in the
Internet back towards their source. This work is motivated by the increased frequency and …

Network support for IP traceback

S Savage, D Wetherall, A Karlin… - IEEE/ACM transactions …, 2001 - ieeexplore.ieee.org
This paper describes a technique for tracing anonymous packet flooding attacks in the
Internet back toward their source. This work is motivated by the increased frequency and …

SOS: Secure overlay services

AD Keromytis, V Misra, D Rubenstein - ACM SIGCOMM Computer …, 2002 - dl.acm.org
Denial of service (DoS) attacks continue to threaten the reliability of networking systems.
Previous approaches for protecting networks from DoS attacks are reactive in that they wait …

Industrial control system network intrusion detection by telemetry analysis

S Ponomarev, T Atkison - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
Until recently, industrial control systems (ICSs) used “air-gap” security measures, where
every node of the ICS network was isolated from other networks, including the Internet, by a …

Detecting spoofed packets

SJ Templeton, KE Levitt - Proceedings DARPA Information …, 2003 - ieeexplore.ieee.org
Packets sent using the IP protocol include the IP address of the sending host. The recipient
directs replies to the sender using this source address. However, the correctness of this …

Systems and methods for providing content and services on a network system

JE Short, FCI Pagan, JJ Goldstein - US Patent 8,364,806, 2013 - Google Patents
First worldwide family litigation filed litigation https://patents. darts-ip. com/? family=
42235157&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

Omni SCADA intrusion detection using deep learning algorithms

J Gao, L Gan, F Buschendorf, L Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In this article, we investigate deep-learning-based omni intrusion detection system (IDS) for
supervisory control and data acquisition (SCADA) networks that are capable of detecting …

Systems and methods for providing content and services on a network system

JE Short, FCI Pagan, JJ Goldstein - US Patent 8,370,477, 2013 - Google Patents
First worldwide family litigation filed litigation Critical https://patents. darts-ip. com/? family=
42235157&utm_source= google_patent&utm_medium= platform_link&utm_campaign …

[BOG][B] Authentication: from passwords to public keys

RE Smith - 2001 - dl.acm.org
Computer access control is an ongoing challenge. Left to themselves, computers tend to
treat one user no differently than another. Computers use authentication to confidently …

SOS: An architecture for mitigating DDoS attacks

AD Keromytis, V Misra… - IEEE Journal on selected …, 2004 - ieeexplore.ieee.org
We propose an architecture called secure overlay services (SOS) that proactively prevents
denial of service (DoS) attacks, including distributed (DDoS) attacks; it is geared toward …