We consider a problem of placing route-based filters in a communication network to limit the number of forged address attacks to a prescribed level. Nodes in the network communicate by exchanging packets along arcs, and the originating node embeds the origin and destination addresses within each packet that it sends. In the absence of a validation mechanism, one node can send packets to another node using a forged origin address to launch an attack against that node. Route-based filters can be established at various nodes on the communication network to protect against these attacks. A route-based filter examines each packet arriving at a node, and determines whether or not the origin address could be legitimate, based on the arc on which t...
In complex networks, filters may be applied at different nodes to control how packets flow. In this ...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerpr...
We analyze a problem in computer network security, wherein packet filters are deployed to defend a n...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
In many information networks, data items – such as updates in social networks, news flowing through ...
Only when we understand how hackers think, can we defend against their attacks. Towards this end, th...
Abstract: A network attack is a set of network elements that are disabled by an ad-versary. The goal...
In many information networks, data items such as updates in social networks, news flowing through in...
Abstract — Today, the Internet is an essential part of everyday life and many important and crucial ...
In complex networks, filters may be applied at different nodes to control how packets flow. In this ...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attac...
A branch-and-bound algorithm is devised to determine the optimal attack strategy to disconnect a net...
It is well known that profiling attacker behavior is an effective way to obtain insights into networ...
In complex networks, filters may be applied at different nodes to control how packets flow. In this ...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerpr...
We analyze a problem in computer network security, wherein packet filters are deployed to defend a n...
Abstract — How can we protect the network infrastructure from malicious traffic, such as scanning, m...
In many information networks, data items – such as updates in social networks, news flowing through ...
Only when we understand how hackers think, can we defend against their attacks. Towards this end, th...
Abstract: A network attack is a set of network elements that are disabled by an ad-versary. The goal...
In many information networks, data items such as updates in social networks, news flowing through in...
Abstract — Today, the Internet is an essential part of everyday life and many important and crucial ...
In complex networks, filters may be applied at different nodes to control how packets flow. In this ...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attac...
A branch-and-bound algorithm is devised to determine the optimal attack strategy to disconnect a net...
It is well known that profiling attacker behavior is an effective way to obtain insights into networ...
In complex networks, filters may be applied at different nodes to control how packets flow. In this ...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerpr...