Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Schuchard, Max"'
BGP route leaks frequently precipitate serious disruptions to interdomain routing. These incidents have plagued the Internet for decades while deployment and usability issues cripple efforts to mitigate the problem. Peerlock, introduced in 2016, addr
Externí odkaz:
http://arxiv.org/abs/2006.06576
We present the Maestro attack, a novel Link Flooding Attack (LFA) that leverages control-plane traffic engineering techniques to concentrate botnet-sourced Distributed Denial of Service flows on transit links. Executed from a compromised or malicious
Externí odkaz:
http://arxiv.org/abs/1905.07673
We examine the extent of needless traffic exposure by the routing infrastructure to nations geographically irrelevant to packet transmission. We quantify what countries are geographically logical to observe on a network path traveling between two nat
Externí odkaz:
http://arxiv.org/abs/1904.09375
The security of the Internet's routing infrastructure has underpinned much of the past two decades of distributed systems security research. However, the converse is increasingly true. Routing and path decisions are now important for the security pro
Externí odkaz:
http://arxiv.org/abs/1811.03716
Autor:
Schuchard, Max, Hopper, Nicholas
An increasing number of systems have been proposed or deployed to the transit core of the Internet with the goal of observing and manipulating traffic in flight, systems we term Traffic Manipulating Boxes. Examples of these include: decoy routing sys
Externí odkaz:
http://arxiv.org/abs/1606.08536
Publikováno v:
2013 IEEE 33rd International Conference on Distributed Computing Systems; 2013, p571-580, 10p
Publikováno v:
Proceedings of the 9th Annual ACM Workshop: Privacy in the Electronic Society; 10/ 4/2010, p1-10, 10p
Autor:
Schuchard, Max, Mohaisen, Abedelaziz, Foo Kune, Denis, Hopper, Nicholas, Kim, Yongdae, Vasserman, Eugene Y.
Publikováno v:
Proceedings of the 17th ACM Conference: Computer & Communications Security; 10/ 4/2010, p726-728, 3p
Publikováno v:
Proceedings of the 17th ACM Conference: Computer & Communications Security; 10/ 4/2010, p717-719, 3p
Autor:
Sarga, Libor, Jašek, Roman
Publikováno v:
Proceedings of the European Conference on Information Warfare & Security; 2011, p228-236, 9p