By Topic

Computer Network Defense, 2008. EC2ND 2008. European Conference on

Date 11-12 Dec. 2008

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (362 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Message from the Organisers

    Publication Year: 2008, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Comittee Lists

    Publication Year: 2008, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Organisers and Sponsors

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • PuppetCast: A Secure Peer Sampling Protocol

    Publication Year: 2008, Page(s):3 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random sample of the node population, and is animportant building block for gossip-based protocols for information dissemination, aggregation, load balancing and network management. Existing peer sampling protocols are either ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture for Inline Anomaly Detection

    Publication Year: 2008, Page(s):11 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    In this paper we propose an intrusion prevention system (IPS) which operates inline and is capable to detect unknown attacks using anomaly detection methods. Incorporated in the framework of a packet filter each incoming packet is analyzed and -- according to an internal connection state and a computed anomaly score -- either delivered to the production system, redirected to a special hardened sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity Attack Resistant Flow Lookup Schemes for IPv6: A Measurement Based Comparison

    Publication Year: 2008, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In this paper we look at the problem of choosing a good flow statelookup scheme for IPv6 firewalls. We want to choose a scheme whichis fast when dealing with typical traffic, but whose performancewill not degrade unnecessarily when subject to a complexity attack.We demonstrate the existing problem and, using captured traffic,assess a number of replacement schemes that are hash and tree based.Our a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reassembly of Fragmented JPEG Images Containing Restart Markers

    Publication Year: 2008, Page(s):25 - 32
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    A fragmented JPEG image is currently not possible to reassemble without knowing the ordering of the fragments. This is a problem for the police when they search for illegal digital images. This paper presents a method to reassemble fragmented JPEG images containing restart markers. Empirical evaluations show that it is possible to reassemble images taken from a set containing fragments of several ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Next-Generation Botnets

    Publication Year: 2008, Page(s):33 - 40
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    In this paper, we introduce the design of an advanced bot called Rambot that is based on the weaknesses we found when tracking a diverse set of botnets over a period of several months. The main features of this bot are peer-to-peer communication, strong cryptography, a credit-point system to build bilateral trust amongst bots, and a proof-of-work scheme to protect against potential attacks. The go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WSIM: A Software Platform to Simulate All-Optical Security Operations

    Publication Year: 2008, Page(s):41 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    Network throughput rates increase every day in contrast to electronic chip processingspeed and electronic I/O. Today's firewalls operate by using traditional electronic circuits just like any common PC. However, performing these operations in a fast fiber optics network on the scale of 40 Gbps is impossible. In this paper, we propose a novel system that is currently being researched and tries to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2008, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2008, Page(s): 50
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE