Paxson

Results: 276



#Item
121Network protocols / Communication / Communications protocol / Data transmission / Protocols / Public-key cryptography / Email / Direct Client-to-Client / Actor model / Computing / Information / Internet

Using Strongly Typed Networking to Architect for Tussle Chitra Muthukrishnan† , Vern Paxson‡,¶ , Mark Allman‡ , Aditya Akella† † ‡

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-10-17 18:13:37
122Computer security / Parallel computing / Network processor / Intrusion prevention system / Communications protocol / Network switch / Denial-of-service attack / Transmission Control Protocol / Snort / Computer network security / Computing / Cyberwarfare

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:12:10
123Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Ping / Google Public DNS / CNAME record / Tor / Dynamic DNS / Domain name system / Internet / Computing

Hold-On: Protecting Against On-Path DNS Poisoning Haixin Duan∗ , Nicholas Weaver†¶ , Zongxu Zhao∗ , Meng Hu∗ , Jinjin Liang∗ , Jian Jiang∗ , Kang Li‡ and Vern Paxson†§ ∗ Tsinghua University, Beijing,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-03-31 21:23:27
124Transmission Control Protocol / Packet Processing / Intrusion prevention system / Packet loss / Network switch / CPU cache / Snort / Network processor / Packet capture / Computer network security / Computing / Firewall

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-09-08 20:27:32
125Cyberwarfare / Snort / Intrusion detection system / Evasion / Transmission Control Protocol / Internet protocol suite / Bro / Computer network security / Software / Computer security

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
126Cryptographic hash function / Hash function / Computing / Information science / Artificial intelligence / Slow-start / Search algorithms / Transmission Control Protocol / Hash table

Efficient and Robust TCP Stream Normalization Mythili Vutukuru and Hari Balakrishnan MIT CSAIL {mythili,hari}@csail.mit.edu Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-03-12 03:14:30
127Data security / Computer network security / Cyberwarfare / Firewall / Port scanner / Nmap / Communications protocol / Transmission Control Protocol / Anomaly detection / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA {jyjung, awberg

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-05-13 23:18:43
128Network switch / Computing / Network architecture / Data / Computer network security / Cyberwarfare / Internet standards / Network performance / Transmission Control Protocol / Throughput

A Preliminary Analysis of TCP Performance in an Enterprise Network∗ Boris Nechaev† , Mark Allman‡ , Vern Paxson‡ , Andrei Gurtov† † Helsinki Institute for Information Technology, ‡ International Computer Sc

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-04-19 15:33:32
129Code Red / Morris worm / Computer virus / Network telescope / Anti-worm / SQL Slammer / Malware / System software / Computer worms

Addressing the Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-02-23 19:36:23
130Cyberwarfare / Computer networking / Pcap / Firewall / Transmission Control Protocol / Traffic flow / Internet protocol suite / Packet Processing / Port / Computing / Software / Computer network security

Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory, Berkeley, CA and AT&T Center for Internet Research at ICSI, Berkeley, CA

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 05:22:35
UPDATE