24,902 Hits in 2.6 sec

Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks

Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Jamin
2006 2006 IEEE International Conference on Multimedia and Expo  
Combining credit constraints with overlay optimization techniques, ripple-stream can achieve both DoS resilience and overlay efficiency.  ...  Ripple-stream leverages existing credit systems to introduce credit constraints in overlay construction such that malicious nodes are pushed to the fringe of overlays.  ...  It can work with existing or future defense schemes to construct DoS resilience overlay networks.  ... 
doi:10.1109/icme.2006.262805 dblp:conf/icmcs/WangXZJ06 fatcat:tbqcgtgptjho5e54gajxwksxie

Provider Provisioned Overlay Networks and Their Utility in DoS Defense

Jinu Kurian, Kamil Sarac
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
To demonstrate the utility of the PON model we consider one of the more difficult applications, denial of service (DoS) defense, and describe a PON overlay which provides DoS defense as a value-added service  ...  Because of ISP involvement, the PON model can better support some of the more difficult overlay-based applications.  ...  FONET: A PON OVERLAY FOR DOS RESISTANT COMMUNICATION In FONet we aim to design an architecture that builds on existing approaches in overlay based DoS defense [5] , [6] .  ... 
doi:10.1109/glocom.2007.95 dblp:conf/globecom/KurianS07 fatcat:l3w7fvnpcjfvxcp7lxzt6z6lmq

Phagocytes: A Holistic Defense and Protection Against Active P2P Worms [article]

Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen
2011 arXiv   pre-print
Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective.  ...  We design a novel adaptive and interaction-based computational puzzle scheme at the Phagocytes to restrain external worms attacking the P2P overlay, without influencing legitimate hosts' experiences significantly  ...  That is, they do not exhibit easily detectable anomalies in the network traffic as scanning worms do, so many existing defenses against scanning worms are no longer effective [32] .  ... 
arXiv:1108.1350v1 fatcat:wlx3l5nvzna6bae6fu3n4zkbge

AID: A global anti-DoS service

Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
2007 Computer Networks  
Authentication can no longer be the means of defense.  ...  The follow-up extension of the anti-DoS overlays for web service has other serious limitations. This paper attempts to solve an important problem.  ...  Background Router-based defense Much work against DoS is on spoofing prevention.  ... 
doi:10.1016/j.comnet.2007.05.005 fatcat:ve2rzh47urc6xansuf6t75iola

Android UI Deception Revisited: Attacks and Defenses [chapter]

Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao, Atul Prakash
2017 Lecture Notes in Computer Science  
We discuss the vulnerabilities found, propose possible defenses, and then evaluate the defenses against different types of UI deception attacks.  ...  App-based deception attacks are increasingly a problem on mobile devices and they are used to steal passwords, credit card numbers, text messages, etc.  ...  This material is based upon work supported by the National Science Foundation under Grant No. 1318722.  ... 
doi:10.1007/978-3-662-54970-4_3 fatcat:qp24pb4ikzfwhbfsmjpfzefmbm

Defending against eclipse attacks on overlay networks

Atul Singh, Miguel Castro, Peter Druschel, Antony Rowstron
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
However, defenses against Sybil attacks do not prevent Eclipse attacks because attackers may manipulate the overlay maintenance algorithm to mount an Eclipse attack.  ...  Our defense can be applied to any overlay and it enables secure implementations of overlay optimizations that choose neighbors according to metrics like proximity.  ...  This defense is based on the idea that it is difficult for the attacker to pretend to be close to all good nodes in the network.  ... 
doi:10.1145/1133572.1133613 dblp:conf/sigopsE/SinghCDR04 fatcat:dqvgz3b2crernhnkhnabb2on5e

Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network [chapter]

Mihui Kim, Jaewon Seo, Kijoon Chae
2007 Lecture Notes in Computer Science  
In this paper, we analyze possible converged attacks, thus we propose a scalable and dynamic notification architecture based on overlay routing against DDoS attacks in consideration of the capacity of  ...  We analyzed the overhead for constructing our hierarchical overlay, simulated the transmission rate and speed of detection notification, and found a marked improvement using our defense compared to general  ...  Overhead of Overlay Construction We assume that our defense overlay is hierarchically constructed based on node capacity.  ... 
doi:10.1007/978-3-540-75664-4_49 fatcat:tirokhx7r5annmmdve3mvvpphm

Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

2008 IEICE transactions on communications  
But single point defense (ex. firewalls) lack a scalability to catch up the increase of the attack traffic. In this paper, we introduce a distributed defense mechanism using overlay netwoeks.  ...  This mechanism detects attacks near the victim servers and alert messages are sent via the overlay networks. Then defense nodes identify legitimate traffic and block malicious ones.  ...  Our mechanism is based on the collaboration of distributed defense nodes by constructing overlay network. Overlay network is effective to alert attacks and protect legitimate traffic.  ... 
doi:10.1093/ietcom/e91-b.8.2618 fatcat:uljon5ansvhatj5j5f5oeri2ge

A posteriori defensive programming

Valerio Schiavoni, Vivien Quéma
2006 Proceedings of the 2006 ACM symposium on Applied computing - SAC '06  
In this paper, we propose an annotation toolkit that allows building DoS resistant component-based systems.  ...  Building DoS resistant software is still an issue. Solutions relying on the use of annotations have been proposed.  ...  We call overlay of components a set of components marked by the same annotation. A component can obviously belong to several overlays. A defensive strategy can be applied on the overlay.  ... 
doi:10.1145/1141277.1141688 dblp:conf/sac/SchiavoniQ06 fatcat:74b46ki2uje2naj33uvxdkdoey

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification [article]

Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck
2020 arXiv   pre-print
Machine learning-based systems for malware detection operate in a hostile environment.  ...  Our system combines multiple, diverse defenses: we address the semantic gap, use various classification models, and apply a stateful defense.  ...  It can be divided into three parts: the header, the sections, and the overlay. All PE files start with a DOS header.  ... 
arXiv:2010.09569v1 fatcat:qw6vgk4qyrhhlfgxsocgaalw4y

Bandwidth Distributed Denial of Service: Attacks and Defenses

Moti Geva, Amir Herzberg, Yehoshua Gev
2014 IEEE Security and Privacy  
In this paper we survey BW-DDoS attacks and defenses.  ...  We discuss currently deployed and proposed defenses. We argue that to meet the increasing threats, more advanced defenses should be deployed.  ...  Similarly, source based defense mechanisms try to prevent an attacker from sending excessive traffic, especially during a BW-DDoS. Additional network location may be in the cloud or overlay networks.  ... 
doi:10.1109/msp.2013.55 fatcat:hhzyivjgyjaqpgicxqrszx2kzm

Distributed Denial of Service Prevention Techniques

B. B. Gupta, R. C. Joshi, Manoj Misra
2010 International Journal of Computer and Electrical Engineering  
The power of SOS is based on the number and distribution level of SOAPs. However, wide deployment of SOAPs is a difficult DoS defense challenge.  ...  Secure Overlay Service (SOS) addresses the problem of how to guarantee the communication between legitimate users and a victim during DoS attacks.  ... 
doi:10.7763/ijcee.2010.v2.148 fatcat:ofuv4xcc6rdlrhurkx4se2isbu

Removing the blinders: Using information to mitigate adversaries in adaptive overlays

David Zage, Charles Killian, Cristina Nita-Rotaru
2011 2011 5th International Conference on Network and System Security  
We demonstrate the susceptibility of adaptation mechanisms to malicious attacks and the utility of our solution through real-life deployments of mature, adaptive overlay-based systems.  ...  In this work, we propose a lightweight, general solution to increase the resiliency of adaptive overlay networks.  ...  As unstructured overlay networks do not have such constraints, the proposed solutions are not directly applicable.  ... 
doi:10.1109/icnss.2011.6059969 dblp:conf/nss/ZageKN11 fatcat:g5ek6fvlfvfavcqzwjefbsafeu

Eclipse Attacks on Overlay Networks: Threats and Defenses

A. Singh, T.-W. Ngan, P. Druschel, D. S. Wallach
2006 Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications  
This paper studies the impact of Eclipse attacks on structured overlays and shows the limitations of known defenses.  ...  Furthermore, unlike most existing defenses, our defense leaves flexibility in the selection of neighboring nodes, thus permitting important overlay optimizations like proximity neighbor selection (PNS)  ...  [11] proposed a novel defense against Eclipse attacks based on induced churn.  ... 
doi:10.1109/infocom.2006.231 dblp:conf/infocom/SinghNDW06 fatcat:ydptkdztlzdnfketzfo3pjt4ai

A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms

Liang Xie, Sencun Zhu
2007 Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007)  
Two approaches are examined: a partition-based approach, which utilizes immunized hosts to proactively stop worm spread in the overlay graph, and a Connected Dominating Set(CDS)-based approach, which utilizes  ...  a group of dominating nodes in the overlay to achieve fast patch dissemination in a race with the worm.  ...  On the other hand, these servers do not participate in the file-sharing process, hence they do not have to be very powerful. We adopt two defense principles.  ... 
doi:10.1109/p2p.2007.4343465 fatcat:g2qztgle5zh7rbsier2lz2c7bq
« Previous Showing results 1 — 15 out of 24,902 results