The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DaaS is a service that protects a server against all 3 types of Distributed Denial-of-Service (DDoS), arbitrary packet, legit user-mimicking and economic attacks. For arbitrary packet DDoS defense, DaaS's framework facilitates harness of intermediaries that relay traffic to a server so that their total resource exceeds those of DDoS bots. For legit user-mimicking DDoS defense, DaaS's unique self-verifying...
Access to Internet services is granted based on application-layer user identities, which also offer accountability. The revered layered network model dictates a disparate network-layer identity scheme for systems. We challenge this religious layered model adherence by demonstrating the practical benefits derived from a cross-layer identity scheme. Instead of a rigid identity, our malleable identity...
Despite the Internet's ability to recover from link failures, the process is laborious. Scalable one-hop source routing (SOSR) hastens the recovery, without complex routing algorithms, by routing around failures via indirect paths created using randomly-selected intermediate end-nodes. Even with only 39 intermediaries available, SOSR effectively masks out 89% of Internet core link failures. However,...
The Internet community has been long convinced that distributed denial-of-service (DDoS) attacks are difficult to combat since IP spoofing prevents traceback to the sources of attacks. Even if traceback is possible, the sheer number of sources that must be shutdown renders trace-back, by itself, ineffective. Due to this belief, much effort has been focused on winning the "arms race" against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.