• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 756
Next 10 →

Host-oblivious security for content-based networks

by Jongmin Jeong, Ted "taekyoung Kwon, Yanghee Choi - In ACM CFI , 2010
"... Network-level security systems rely significantly on network operations. This reliance has led to conventional network-level security systems based on a host-centric architecture because the network operations themselves are based on hosts. However, host-dependent network security schemes are no lon ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
are no longer applicable in content-based networks. In this paper, a host-oblivious network security paradigm for content-based networks is introduced, and then a com-prehensive security procedure focusing on generating and sharing diverse secret keys is proposed. Then the proposed scheme, which provides

Content-Based Networking: A New Communication Infrastructure

by Antonio Carzaniga, Alexander L. Wolf , 2001
"... We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/subscribe middleware, and that this middleware in turn demands a new kind of communication infrastructure for its proper impleme ..."
Abstract - Cited by 116 (10 self) - Add to MetaCart
distributed network, providing appropriate guarantees of reliability, security, and performance. We do not propose content-based networking as a replacement for IP, nor do we advocate an implementation of a publish/subscribe middleware at the network level (i.e., within routers). Instead, we argue

Understanding the NetworkLevel Behavior of Spammers

by Anirudh Ramachandran, Nick Feamster , 2006
"... This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets. We try to answer these questions by ana ..."
Abstract - Cited by 290 (22 self) - Add to MetaCart
, typically for hijacked prefixes. These trends suggest that developing algorithms to identify botnet membership, filtering email messages based on network-level properties (which are less variable than email content), and improving the security of the Internet routing infrastructure, may prove

Automated worm fingerprinting

by Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage - In OSDI , 2004
"... Network worms are a clear and growing threat to the security of today’s Internet-connected hosts and networks. The combination of the Internet’s unrestricted connectivity and widespread software homogeneity allows network pathogens to exploit tremendous parallelism in their propagation. In fact, mod ..."
Abstract - Cited by 317 (9 self) - Add to MetaCart
Network worms are a clear and growing threat to the security of today’s Internet-connected hosts and networks. The combination of the Internet’s unrestricted connectivity and widespread software homogeneity allows network pathogens to exploit tremendous parallelism in their propagation. In fact

Fast Content-Based Packet Handling for Intrusion Detection

by Mike Fisk, George Varghese , 2001
"... It is becoming increasingly common for network devices to handle packets based on the contents of packet payloads. Example applications include intrusion detection, firewalls, web proxies, and layer seven switches. This paper analyzes the problem of intrusion detection and its reliance on fast strin ..."
Abstract - Cited by 48 (0 self) - Add to MetaCart
on the structuring of content-based handlers, string matching algorithms in general, and the importance of performance to security.

A Distributed Content-Based Search Engine Based on

by Mobile Code Volker, Volker Roth - In Proc. 20th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS , 2005
"... Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this process covers only publicly available content because content providers are concerned that they otherwise loose control over ..."
Abstract - Add to MetaCart
over the distribution of their intellectual property. We present the prototype of our secure and distributed search engine, which dynamically pushes content based feature extraction to image providers. Thereby, the volume of data that is transported over the network is significantly reduced

Content-based Management of Document Access Control

by Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwarter - 14th International Conference on Applications of Prolog (INAP), Prolog Association of , 2001
"... Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strength and weakness. No one can urge that any of these models can offer alone by itself an automated support for either the se ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
the security or the access rights. In this paper, we propose a content-based management model for the access control to documents in a large enterprise. The model determines the access rights to documents based on their content and automatically classifies the access levels or detects possible incorrect

Secure Route Discovery in Wireless Image Content-Based authentication

by unknown authors
"... Abstract: The introduction of 3G wireless communication systems, together with the invasive distribution of digital images in mobile devices and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wi ..."
Abstract - Add to MetaCart
and wireless networks. To meet this need, a content-based image authentication scheme that is suitable for an insecure network and robust to transmission errors. In proposed scheme,The Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through

Efficient Content-Based Detection of Zero-Day Worms

by unknown authors
"... Abstract — Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step towards combating new unknown worms is to be able to detect and identify t ..."
Abstract - Add to MetaCart
them at the first stages of their spread. In this paper, we present a novel method for detecting new worms based on identifying similar packet contents directed to multiple destination hosts. We evaluate our method using real traffic traces that contain real worms. Our results suggest that our approach

A Distributed Content-Based Search Engine Based on Mobile Code

by Volker Roth, Ulrich Pinsdorf, Jan Peters - In Proc. 20th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS , 2005
"... Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this process covers only publicly available content because content providers are concerned that they otherwise loose control over ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
over the distribution of their intellectual property. We present the prototype of our secure and distributed search engine, which dynamically pushes content based feature extraction to image providers. Thereby, the volume of data that is transported over the network is significantly reduced
Next 10 →
Results 1 - 10 of 756
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University