Kwun Yin Yu

Learn More
Distributed denial-of-service (DDoS) attack has turned into one of the major security threats in recent years. Usually the only solution is to stop the services or shut down the victim and then discard the attack traffic only after the DDoS attack characteristics (such as the destination ports of the attack packets) are known. In this paper, we introduce a(More)
Locating the sensor nodes in an ad hoc wireless sensor network (WSN) is a very challenging task. In general, the network nodes are not synchronised and the internal delays within the sensor nodes may be unknown. As a result, the positioning problem can not be solved by simply using the triangulation method and certain prior information must be provided. In(More)
—In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online(More)
Soft processors simplify hardware design by being able to implement complex control strategies using software. However, they are not fast enough for many intensive data-processing tasks, such as highly data-parallel embedded applications. This thesis suggests adding a vector processing core to the soft processor as a general-purpose accelerator for these(More)
  • 1