• Publications
  • Influence
Named data networking
TLDR
Named Data Networking (NDN) is one of five projects funded by the U.S. National Science Foundation under its Future Internet Architecture Program. Expand
  • 1,342
  • 200
  • PDF
A framework for classifying denial of service attacks
TLDR
This paper introduces a framework for classifying DoS attacks based on header content, and novel techniques such as transient ramp-up behavior and spectral analysis. Expand
  • 543
  • 17
  • PDF
Census and survey of the visible internet
TLDR
We use censuses to walk the entire address space, and surveys to probe frequently a fraction of that space. Expand
  • 164
  • 15
  • PDF
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks
TLDR
We study the dramatic rise of NTP-based DDoS attacks, in a span of just a few months, from a mere trickle to rapidly become the primary DDoS vector for large attacks. Expand
  • 126
  • 12
  • PDF
An error control scheme for large-scale multicast applications
TLDR
We extend the IP Multicast service model so that routers provide a more refined form of multicasting (which may be useful to other applications), that enables local recovery. Expand
  • 101
  • 10
Cossack: coordinated suppression of simultaneous attacks
TLDR
DDoS attacks are highly distributed, well coordinated, offensive assaults on services, hosts, and infrastructure of the Internet. Expand
  • 57
  • 10
Eliminating Steganography in Internet Traffic with Active Wardens
TLDR
We introduce the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications. Expand
  • 191
  • 9
  • PDF
ICDAR 2009 Page Segmentation Competition
TLDR
This paper presents an objective comparative evalua-tion of layout analysis methods in realistic circumstances. Expand
  • 133
  • 9
Performance of Networked XML-Driven Co-Operative Applications
TLDR
This paper focuses on the transmission of XML data and the role of compression to enhance performance by minimizing the impact of transmission time. Expand
  • 21
  • 8
  • PDF
COSSACK: Coordinated Suppression of Simultaneous Attacks
TLDR
The Cossack project is developing technology to thwart such attacks by deploying a set of watchdogs at edge networks, which employ distributed coordination to rapidly detect, and neutralize attacks. Expand
  • 128
  • 7
  • PDF