scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Open accessProceedings ArticleDOI
Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu 
14 Apr 2013
38 Citations
In this paper, we propose a protocollevel hidden server discovery approach to locate the Tor hidden server that hosts the illegal website.
The results also hold for systems with general routing but in which no server can block more than one other server simultaneously.
This reliance on a central server also makes current systems inappropriate for wide area network use where the network bandwidth to the server may be limited.
Proceedings ArticleDOI
Eric Y. Chen, Mistutaka Itoh 
08 Jun 2010
29 Citations
In this paper, we argue that whitelist, as a strategy to defend against flooding attacks, can be more effective on a SIP server than a Web server.
Open accessJournal ArticleDOI
Torsten Kleinow, Heiko Lehmann 
19 Citations
This avoids the need to implement TCP/IP communication methods on the server side.
Proceedings ArticleDOI
Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim 
16 Oct 2007
268 Citations
From the experiments on a campus network, it is shown that the proposed mechanism can detect botnets effectively while bots are connecting to their server or migrating to another server.
We remark that popular open-source server implementations are not susceptible to this attack, since they typically do not support the explicit curve option.