Results 1 - 10
of
756
Host-oblivious security for content-based networks
- In ACM CFI
, 2010
"... Network-level security systems rely significantly on network operations. This reliance has led to conventional network-level security systems based on a host-centric architecture because the network operations themselves are based on hosts. However, host-dependent network security schemes are no lon ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
are no longer applicable in content-based networks. In this paper, a host-oblivious network security paradigm for content-based networks is introduced, and then a com-prehensive security procedure focusing on generating and sharing diverse secret keys is proposed. Then the proposed scheme, which provides
Content-Based Networking: A New Communication Infrastructure
, 2001
"... We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/subscribe middleware, and that this middleware in turn demands a new kind of communication infrastructure for its proper impleme ..."
Abstract
-
Cited by 116 (10 self)
- Add to MetaCart
distributed network, providing appropriate guarantees of reliability, security, and performance. We do not propose content-based networking as a replacement for IP, nor do we advocate an implementation of a publish/subscribe middleware at the network level (i.e., within routers). Instead, we argue
Understanding the NetworkLevel Behavior of Spammers
, 2006
"... This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets. We try to answer these questions by ana ..."
Abstract
-
Cited by 290 (22 self)
- Add to MetaCart
, typically for hijacked prefixes. These trends suggest that developing algorithms to identify botnet membership, filtering email messages based on network-level properties (which are less variable than email content), and improving the security of the Internet routing infrastructure, may prove
Automated worm fingerprinting
- In OSDI
, 2004
"... Network worms are a clear and growing threat to the security of today’s Internet-connected hosts and networks. The combination of the Internet’s unrestricted connectivity and widespread software homogeneity allows network pathogens to exploit tremendous parallelism in their propagation. In fact, mod ..."
Abstract
-
Cited by 317 (9 self)
- Add to MetaCart
Network worms are a clear and growing threat to the security of today’s Internet-connected hosts and networks. The combination of the Internet’s unrestricted connectivity and widespread software homogeneity allows network pathogens to exploit tremendous parallelism in their propagation. In fact
Fast Content-Based Packet Handling for Intrusion Detection
, 2001
"... It is becoming increasingly common for network devices to handle packets based on the contents of packet payloads. Example applications include intrusion detection, firewalls, web proxies, and layer seven switches. This paper analyzes the problem of intrusion detection and its reliance on fast strin ..."
Abstract
-
Cited by 48 (0 self)
- Add to MetaCart
on the structuring of content-based handlers, string matching algorithms in general, and the importance of performance to security.
A Distributed Content-Based Search Engine Based on
- In Proc. 20th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS
, 2005
"... Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this process covers only publicly available content because content providers are concerned that they otherwise loose control over ..."
Abstract
- Add to MetaCart
over the distribution of their intellectual property. We present the prototype of our secure and distributed search engine, which dynamically pushes content based feature extraction to image providers. Thereby, the volume of data that is transported over the network is significantly reduced
Content-based Management of Document Access Control
- 14th International Conference on Applications of Prolog (INAP), Prolog Association of
, 2001
"... Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strength and weakness. No one can urge that any of these models can offer alone by itself an automated support for either the se ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
the security or the access rights. In this paper, we propose a content-based management model for the access control to documents in a large enterprise. The model determines the access rights to documents based on their content and automatically classifies the access levels or detects possible incorrect
Secure Route Discovery in Wireless Image Content-Based authentication
"... Abstract: The introduction of 3G wireless communication systems, together with the invasive distribution of digital images in mobile devices and the growing concern on their originality triggers an emergent need of authenticating images received by unreliable channels, such as public Internet and wi ..."
Abstract
- Add to MetaCart
and wireless networks. To meet this need, a content-based image authentication scheme that is suitable for an insecure network and robust to transmission errors. In proposed scheme,The Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through
Efficient Content-Based Detection of Zero-Day Worms
"... Abstract — Recent cybersecurity incidents suggest that Internet worms can spread so fast that in-time human-mediated reaction is not possible, and therefore initial response to cyberattacks has to be automated. The first step towards combating new unknown worms is to be able to detect and identify t ..."
Abstract
- Add to MetaCart
them at the first stages of their spread. In this paper, we present a novel method for detecting new worms based on identifying similar packet contents directed to multiple destination hosts. We evaluate our method using real traffic traces that contain real worms. Our results suggest that our approach
A Distributed Content-Based Search Engine Based on Mobile Code
- In Proc. 20th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS
, 2005
"... Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this process covers only publicly available content because content providers are concerned that they otherwise loose control over ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
over the distribution of their intellectual property. We present the prototype of our secure and distributed search engine, which dynamically pushes content based feature extraction to image providers. Thereby, the volume of data that is transported over the network is significantly reduced
Results 1 - 10
of
756