11 April 2010

Special issue: Recent advances in network security attacks and defences

International Journal of Internet Protocol Technology 5(1/2) 2010
  • Analysis of firewall policy rules using traffic mining techniques
  • Discovering last-matching rules in popular open-source and commercial firewalls
  • Evaluation of gatekeeper proxies for firewall traversal in secure videoconferencing systems
  • Detecting and blocking P2P botnets through contact tracing chains
  • Request diversion: a novel mechanism to counter P2P based DDoS attacks
  • Real-time behaviour profiling for network monitoring
  • A hybrid scheme using packet marking and logging for IP traceback
  • On investigating ARP spoofing security solutions
Additional paper
  • Simplified watermarking scheme for sensor networks

No comments: