Learn More
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack(More)
Many network attacks forge the source address in their IP packets to block traceback. Recently, research activity has focused on packet-tracing mechanisms to counter this deception. Unfortunately, these mechanisms are either too expensive or ineffective against distributed attacks where traffic comes from multiple directions, and the volume in each(More)
We identify a number of principles with respect to prediction that, we argue, underpin adult language comprehension: (a) comprehension consists in realizing a mapping between the unfolding sentence and the event representation corresponding to the real-world event being described; (b) the realization of this mapping manifests as the ability to predict both(More)
Since 2004, the DETER Cybersecurity Testbed Project has worked to create the necessary infrastructure — facilities, tools, and processes-to provide a national resource for experimentation in cyber security. The next generation of DETER envisions several conceptual advances in testbed design and experimental research methodology, targeting improved(More)
This work investigates production preferences in different languages. Specifically, it examines how animacy, competition processes, and language-specific constraints shape speakers' choices of structure. English, Spanish and Serbian speakers were presented with depicted events in which either an animate or inanimate entity was acted upon by an agent.(More)
Defenses against flooding distributed denial-of-service (DDoS) commonly respond to the attack by dropping the excess traffic, thus reducing the overload at the victim. The major challenge is the differentiation of the legitimate from the attack traffic, so that the dropping policies can be selectively applied. We propose D-WARD, a source-end DDoS defense(More)
An increasing number of wireless devices and services imposes higher demands for wireless networks' capacity. Likewise, contemporary bandwidth requirements of each user in the network rise significantly, being a mixture of traffic types such as Web surfing, file transfer protocol (FTP), video, video-teleconference, and voice. Multiple input-multiple output(More)