Learn More
Recent malicious attempts are intended to get financial benefits through a large pool of compromised hosts, which are called software robots or simply "bots." A group of bots, referred to as a botnet, is remotely controllable by a server and can be used for sending spam mails, stealing personal information, and launching DDoS attacks. Growing popularity of(More)
It was recently shown that 802.11b MAC has an “anomaly” that the throughput of high bit-rate terminals in good channel condition is down-equalized to that of the lowest bit-rate peer in the network. In this letter, we analytically prove that the phenomenon can be cleanly resolved through configuring the initial contention window size inversely proportional(More)
This article presents what we call the parallel coordinate attack visualization (PCAV) for detecting unknown large-scale Internet attacks including Internet worms, DDoS attacks and network scanning activities. PCAV displays network traffic on the plane of parallel coordinates using the flow information such as the source IP address, destination IP address,(More)
Recent malicious attempts are intended to obtain financial benefits using a botnet which has become one of the major Internet security problems. Botnets can cause severe Internet threats such as DDoS attacks, identity theft, spamming, click fraud. In this paper, we define a group activity as an inherent property of the botnet. Based on the group activity(More)
The IEEE 802.15.4 MAC (Medium Access Control) is a protocol used in many applications including the wireless sensor network. Yet the IEEE 802.15.4 MAC layer cannot support different throughput performance for individual nodes with the current specifications. However, if certain nodes are sending data more frequently compared to others, with the standard(More)
In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on the design of the TCP and the analysis(More)
Algorithmic approach to link adaptation for IEEE 802.11 networks such as Automatic Rate Fallback (ARF) is known to suffer from the inability to differentiate between collision and channel-induced error. In this paper, we propose a novel algorithm called COLA that overcomes the shortcoming and achieves near-optimal throughput over wide range of channel and(More)
With rampant deployment of wireless technologies such as WLAN, information leakage is increasingly becoming a threat for its serious adopters such as enterprises. Research on antidotes has been mainly focused on logical measures such as authentication protocols and secure channels, but an inside collaborator can readily circumvent such defenses and(More)
Designing and distributing effective vehicular safety applications can help significantly reduce the number of car accidents and assure the safety of many precious lives. However, despite the efforts from standardization bodies and industrial manufacturers, many studies suggest that it will take more than a decade for full deployment. We start this work(More)