The internet today is not as transparent as was envisioned at its inception. While most of the responsibility for handling advanced communications functions remains concentrated in the end systems, we are deploying more sophisticated processing inside the network. Applications and application-level protocols such as end-to-end security and congestion control can interact in unexpected ways with network based functions such as proxies, address translators, packet filters, and nodes that perform traffic shaping and differentiated services functions. In this paper we review several recent examples of these types of interactions and extract from these examples a sense of the basic protocol functions that cause potentially harmful interactions. ...
The way users utilize the Internet has drastically changed in the last decade. Some years ago, the a...
Proxies, software deployed inside the network, play a fundamental role in the Internet by providing ...
A methodology and architecture have been developed that contrast sharply with common interpretations...
Original published 16th IFIP World Computer Congress, WCC 2000Networked and distributed systems have...
Application-layer protocols play a special role in network programming. Typical programmers are more...
This document identifies problems that may result from the absence of formal coordination and joint ...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
The article aims to provide a concise introduction to the network protocols and methods of their exp...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
This paper describes a set of experiments performed on six different vendor TCP implementations usin...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
We present an empirical study of the resistance of several protocols to denial of service (DoS) atta...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
The basic concept behind the Internet is expressed by the scalability argument: mechanism or service...
The way users utilize the Internet has drastically changed in the last decade. Some years ago, the a...
Proxies, software deployed inside the network, play a fundamental role in the Internet by providing ...
A methodology and architecture have been developed that contrast sharply with common interpretations...
Original published 16th IFIP World Computer Congress, WCC 2000Networked and distributed systems have...
Application-layer protocols play a special role in network programming. Typical programmers are more...
This document identifies problems that may result from the absence of formal coordination and joint ...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
The article aims to provide a concise introduction to the network protocols and methods of their exp...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
This paper describes a set of experiments performed on six different vendor TCP implementations usin...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
We present an empirical study of the resistance of several protocols to denial of service (DoS) atta...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
The basic concept behind the Internet is expressed by the scalability argument: mechanism or service...
The way users utilize the Internet has drastically changed in the last decade. Some years ago, the a...
Proxies, software deployed inside the network, play a fundamental role in the Internet by providing ...
A methodology and architecture have been developed that contrast sharply with common interpretations...