Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomaly-based intrusion detection systems (IDSs) have made use of the quickly spreading nature of these attacks to identify them with high sensitivity and at low false positive (FP) rates.… (More)
Reliable data multicast is difficult to scale. Fcast, " file multicasting " , combines multicast with Forward Error Correction (FEC) to solve this problem. Like classic multicast, Fcast scales to large audiences, and like other FEC schemes, it uses bandwidth very efficiently. Some of the benefits of this combination were known previously, but Fcast… (More)
Traditionally, user traffic profiling is performed by analyzing traffic traces collected on behalf of the user at aggregation points located in the middle of the network. However, the modern enterprise network has a highly mobile population that frequently moves in and out of its physical perimeter. Thus an in-the-network monitor is unlikely to capture full… (More)
As integrated services have become available to the desktop, users have embraced new modes of interaction, such as multimedia conferencing and collaborative computing. In this paper, we provide a survey of past and present research that has influenced this application area, and describe research directions for the future.
We describe a method to detect botnet command and control traffic and individual end-hosts. We introduce the notion of " destination traffic atoms " which aggregate the destinations and services that are communicated with. We then compute the " persistence " , which is a measure of temporal regularity and that we propose in this paper, for individual… (More)
We have developed a scalable reliable multicast architecture for delivering one-to-many telepresentations. In contrast to audio and video, which are often transmitted unreliably, other media, such as slides, images and animations require reliability. Our approach transmits the data in two layers. One layer is for session-persistent data, with reliability… (More)
—Motivated by the " clean-slate " opportunity of the evolving Smart Grid, we propose an Information Centric Networking (ICN) approach for the home communications fabric and create an ICN-based secure publish-subscribe system to support home energy management. We design a secure group communication protocol with efficient key management specifically embedded… (More)
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We enhance ICN's ability to support data confidentiality by introducing attribute-based encryption into ICN and making it specific to the data attributes. Our approach is unusual in that it preserves ICN's goal to decouple publishers and subscribers for greater data… (More)