Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect t...
详细信息
ISBN:
(纸本)9728865252
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to defend against distributed denial of service attacks by coordinating across the Internet. Unlike traditional IDS, we detect and stop DDoS attacks within the intermediate network. In the proposed approach, DDoS defense systems are deployed in the network to detect DDoS attacks independently. A gossip based communication mechanism is used to exchange information about network attacks between these independent detection nodes to aggregate information about the overall network attacks observed. Using the aggregated information, the individual defense nodes have approximate information about global network attacks and can stop them more effectively and accurately. To provide reliable, rapid and widespread dissemination of attack information, the system is built as a peer to peer overlay network on top of the internet.
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes i...
详细信息
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes in which a low cost, reliable antenna is realized by printed circuit traces. We show how to combine the analysis from 2.5D and 3D EM simulators with the PCB design tools to create predictable nodes with printed antennas that meet stringent power and data transmission range goals. The presented approach is applied to the design of a IEEE802.15.4 wireless node deployed in several indoor environments. Copyright 2005 ACM.
Wireless Sensor Networks (WSN) are a subset of wireless networking applications focused on enabling sensor and actuator connectivity without the use of wires. Energy consumption among the wireless devices participatin...
详细信息
To increase the likelihood for software project success, it is important to be able to identify the drivers of success. This paper compares three methods to identify similar projects with the objective to predict proj...
详细信息
over the last few years, Grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on th...
详细信息
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-ba...
详细信息
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-based coordination space. Comet provides a global virtual shared-space that can be associatively accessed by all peer nodes in the system, and access is independent of the physical location of the tuples or identifiers of the host. Dynamically constructed, transient coordination spaces are also supported to enable context locality to be explicitly exploited for improving system performance. The design, implementation, and experimental evaluation of Comet using the PlanetLab platform are presented.
computersystems hosting critical e-commerce applications must typically satisfy stringent quality-of-service (QoS) requirements under dynamic operating conditions and workloads. Also, as such systems increase in size...
详细信息
In this paper we present the design of the rule-based framework for the runtime management of high-performance parallel scientific applications. The framework addresses the formulation of application management behavi...
详细信息
In this paper we present the design of the rule-based framework for the runtime management of high-performance parallel scientific applications. The framework addresses the formulation of application management behaviors as reaction rules, the injection of rules at runtime, their correct, efficient and scalable parallel enforcement, and the detection and resolution of rule conflicts. Unlike rule-based frameworks in business management and security and resource management domains, the presented framework focuses on high-performance parallel scientific applications, which require consistent and efficient management across processors and components. The framework is part of the Accord programming system (Liu et al., 2004)
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight self-optimizing agents embedded withi...
详细信息
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfigu...
详细信息
Reconfiguration and self-adaptation are vital capabilities of sensor networks and networked embedded systems that are required to operate in dynamic environments. This paper presents an approach for software reconfiguration based on exploration of the design space of the application. The design space is represented by formally modeling all the software components, their alternative implementations and their interactions. Reconfiguration is triggered by monitoring the system and is performed by transitioning to a new configuration that satisfies the system constraints. The approach is demonstrated using experimental results for a representative tracking application.
暂无评论