Abstract—Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high-performance implementation of such a network is an efficient design of the credentials that are carried in the packet and the verification procedure on the router. We present a capabilities system that uses packet credentials based on Bloom filters. The credentials are fixed length (independent of the number of routers that are traversed by the packet) and can be veri...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
In this paper, we consider a variant of packet replay attacks wherein, an attacker simply replays ov...
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the s...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
Capabilities-based networks present a fundamental shift in the security design of network architectu...
Abstract—In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing archit...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
A key challenge in combating Denial of Service (DoS) attacks is to reliably identify attack sources ...
Abstract — Today, the Internet is an essential part of everyday life and many important and crucial ...
Today's Internet is built on decades-old networking protocols that lack scalability, reliability and...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
A computer network is said to provide hop integrity iff when any router in the network receives a me...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
This paper compares and analyses the Denial-of-Service attacks in the two different Network architec...
We present an interesting application of network processors in the field of network security. Specif...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
In this paper, we consider a variant of packet replay attacks wherein, an attacker simply replays ov...
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the s...
Abstract—Capabilities-based networks present a fundamental shift in the security design of network a...
Capabilities-based networks present a fundamental shift in the security design of network architectu...
Abstract—In this paper, we propose and analyze an in-packet Bloom-filter-based source-routing archit...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
A key challenge in combating Denial of Service (DoS) attacks is to reliably identify attack sources ...
Abstract — Today, the Internet is an essential part of everyday life and many important and crucial ...
Today's Internet is built on decades-old networking protocols that lack scalability, reliability and...
The implementation of label swapping packet forwarding technology increases the vulnerability to ins...
A computer network is said to provide hop integrity iff when any router in the network receives a me...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
This paper compares and analyses the Denial-of-Service attacks in the two different Network architec...
We present an interesting application of network processors in the field of network security. Specif...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
In this paper, we consider a variant of packet replay attacks wherein, an attacker simply replays ov...
The nodes in MANET are free to move in a limited grid layout without the presence of vision of the s...