The Community for Technology Leaders
2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (2005)
Columbus, Ohio, USA
June 6, 2005 to June 10, 2005
ISSN: 1545-0678
ISBN: 0-7695-2328-5
TABLE OF CONTENTS
Session 1: Network Attack Traceback

InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic (Abstract)

Rajesh Talpade , Telcordia Technologies, Inc.
Larry Wong , Telcordia Technologies, Inc.
Abhrajit Ghosh , Telcordia Technologies, Inc.
Giovanni Di Crescenzo , Telcordia Technologies, Inc.
pp. 99-106

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets (Abstract)

Peng Ning , North Carolina State University
Douglas S. Reeves , North Carolina State University
Pai Peng , North Carolina State University
Xinyuan Wang , George Mason University
pp. 107-113

Specifying Information-Flow Controls (Abstract)

Howard Chivers , University of York
Jeremy Jacob , University of York
pp. 114-120
Session 2: Internet Infrastructure Security and Intrusion Detection

MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks (Abstract)

Yu Chen , University of Southern California
Kai Hwang , University of Southern California
Yu-Kwong Kwok , University of Southern California
pp. 123-129

Performing BGP Experiments on a Semi-realistic Internet Testbed Environment (Abstract)

S. Felix Wu , University of California at Davis
Chen-Nee Chuah , University of California at Davis
Kwan-Liu Ma , University of California at Davis
Ke Zhang , University of California at Davis
Shih-Ming Tseng , University of California at Davis
Rattapon Limprasittipom , University of California at Davis
Soon-Tee Teoh , University of California at Davis
pp. 130-136

A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and Recovery (Abstract)

Roy Friedman , Technion - Israel Institute of Technology
Adnan Agbaria , University of Illinois at Urbana-Champaign
pp. 137-143

Configurable Middleware-Level Intrusion Detection for Embedded Systems (Abstract)

David E. Bakken , Washington State University
Eivind N?ss , Washington State University
A. David McKinnon , Atomic ORBS
Deborah A. Frincke , Pacific Northwest National Laboratory
pp. 144-151
Session 3: Digital Forensics & Covert Channel Analysis

Forensix: A Robust, High-Performance Reconstruction System (Abstract)

Ashvin Goel , University of Toronto
Wu-chi Feng , Portland State University
David Maier , Portland State University
Jonathan Walpole , Portland State University
Wu-chang Feng , Portland State University
pp. 155-162

A Simple Framework for Distributed Forensics (Abstract)

Yongping Tang , Iowa State University
Thomas E. Daniels , Iowa State University
pp. 163-169

Capacity Estimation of Non-Synchronous Covert Channels (Abstract)

Ruby B. Lee , Princeton University
Zhenghong Wang , Princeton University
pp. 170-176
Session 4: Wireless and Sensor Network Security

Defending against Sybil Attacks in Sensor Networks (Abstract)

Douglas S. Reeves , North Carolina State University
Pan Wang , North Carolina State University
Qinghua Zhang , North Carolina State University
Peng Ning , North Carolina State University
pp. 185-191
Session 5: Work-in-Progress (WIP) Session

Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique (Abstract)

Natalia Stakhanova , Iowa State University
Samik Basu , Iowa State University
Oleg Stakhanov , Iowa State University
Johnny Wong , Iowa State University
pp. 203-209

A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks (Abstract)

Syed A. Khayam , Michigan State University
Hayder Radha , Michigan State University
pp. 210-216

Real-Time Protection against DDoS Attacks Using Active Gateways (Abstract)

Onur Demir , State University of New York at Binghamton
Kanad Ghose , State University of New York at Binghamton
pp. 224-231
91 ms
(Ver 3.1 (10032016))