default search action
3. DISCEX 2003: Washington, DC, USA
- 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA. IEEE Computer Society 2003, ISBN 0-7695-1897-4
Volume I
Distributed Denial of Service (DDOS) Defenses
- Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan:
COSSACK: Coordinated Suppression of Simultaneous Attacks. 2-13 - Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall:
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. 14-25 - W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst:
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. 26-
Access Control, Authorization, and Anonymity
- Robert Watson, Brian Feldman, Adam Migus, Chris Vance:
Design and Implementation of the TrustedBSD MAC Framework. 38-49 - Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim:
Dynamic Authorization and Intrusion Response in Distributed Systems. 50-61 - H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott O. Bradner:
Design and Analysis of an IP-Layer Anonymizing Infrastructure. 62-
Survivability, Fault Tolerance, and Containment
- John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan:
Towards a Rigorous Definition of Information System Survivability. 78-89 - Dick O'Brien, Rick Smith, Tammy Kappel, Clint Bitzer:
Intrusion Tolerance Via Network Layer Controls. 90-96 - Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson:
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security. 97-
Red Teams and Operational Experimentation
- David Levin:
Lessons Learned in Using Live Red Teams in IA Experiments. 110-119 - Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright, John Viega:
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. 120-129 - Seth Robertson, Eric V. Siegel, Matthew Miller, Salvatore J. Stolfo:
Surveillance Detection in High Bandwidth Environments. 130-
Anomaly Detection
- Alfonso Valdes:
Detecting Novel Scans Through Pattern Anomaly Detection. 140-151 - Christoph C. Michael:
Finding the Vocabulary of Program Behavior Data for Anomaly Detection. 152-163 - Steven J. Templeton, Karl E. Levitt:
Detecting Spoofed Packets. 164-
Trust Management
- Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith:
The STRONGMAN Architecture. 178-188 - Timothy J. Smith, Gregory T. Byrd, Xiaoyong Wu, Hongjie Xin, Krithiga Thangavelu, Rong Wang, Arpan Shah:
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. 189-200 - Ninghui Li, John C. Mitchell:
A Role-based Trust-management Framework. 201-
Routing and Group Communications
- Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Mohit Lad, Dan Pei, Lan Wang, Lixia Zhang:
Understanding BGP Behavior through a Study of DoD Prefixes. 214-225 - Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. 226-237 - Jonathan K. Millen, Grit Denker:
MuCAPSL. 238-
Optical and Wireless Networking
- Sava Stanic, Suresh Subramaniam, Hongsik Choi, Gokhan Sahin, Hyeong-Ah Choi:
Efficient Alarm Management in Optical Networks. 252-260 - Sudarshan Vasudevan, Brian DeCleene, Neil Immerman, James F. Kurose, Donald F. Towsley:
Leader Election Algorithms for Wireless Ad Hoc Networks. 261-272 - Rui Jiang, Vikram Gupta, Chinya V. Ravishankar:
Interactions Between TCP and the IEEE 802.11 MAC Protocol. 273-
Attack Modeling and Response
- Steven Cheung, Ulf Lindqvist, Martin W. Fong:
Modeling Multistep Cyber Attacks for Scenario Recognition. 284-292 - D. Nojiri, Jeff Rowe, Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation. 293-302 - Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred:
Statistical Approaches to DDoS Attack Detection and Response. 303-
Volume II
Composable High Assurance Trusted Systems (CHATS)
- Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida:
Open-Source PKI on SELinux A Technology Description. 4-6 - Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis:
Demonstration of COSAK static analysis tools. 7-9 - Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt:
MYSEA Technology Demonstration. 10-12 - Robert Watson, Brian Feldman, Adam Migus, Chris Vance:
The TrustedBSD MAC Framework. 13-
Cyber Panel
- Anita D'Amico, Stephen Salas:
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. 18-20 - Derek Armstrong, Sam Carter, Gregory L. Frazier, Tiffany M. Frazier:
A Controller-Based Autonomic Defense System. 21-23 - Walter L. Heimerdinger:
Scyllarus Intrusion Detection Report Correlator and Analyzer. 24-26 - Calvin Ko:
System Health and Intrusion Monitoring: Technology Description. 27-29 - David J. Musliner:
CIRCADIA Demonstration: Active Adaptive Defense. 30-31 - Laura Tinnel, O. Sami Saydjari, Joshua W. Haines:
An Integrated Cyber Panel System. 32-34 - J. Ken Williams:
Intelligence Preparation of the Information Battlespace (IPIB). 35-
Dynamic Coalitions (DC)
- Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. 38-40 - Thomas Kostas, Diane Kiwior, Gowri Rajappan, Michel Dalal:
Key Management for Secure Multicast Group Communication in Mobile Networks. 41-43 - Jim Irrer, Atul Prakash, Patrick D. McDaniel:
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. 44-46 - Sandeep N. Bhatt, S. Raj Rajagopalan, Prasad Rao:
Federated Security Management for Dynamic Coalitions. 47-48 - Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu:
TrustBuilder: Negotiating Trust in Dynamic Coalitions. 49-51 - Timothy J. Smith, Gregory T. Byrd:
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions. 52-54 - William Stephens, Brian A. Coan, Sanjai Narain, Vikram Kaul, Kirthika Parmeswaran, Thanh Cheng:
A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description. 55-57 - Michael T. Goodrich, Michael Shin, Christian D. Straub, Roberto Tamassia:
Distributed Data Authenication (System Demonstration). 58-59 - William H. Winsborough, Jay Jacobs:
Automated Trust Negotiation Technology with Attribute-based Access Control. 60-
Fault Tolerant Networks (FTN)
- Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu:
The Wackamole Approach to Fault Tolerant Networks Demo. 64-65 - W. J. Blackert, Donna M. Gregg, A. K. Castner, R. L. Hom, R. M. Jokerst, E. M. Kyle:
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA). 66-67 - Hyeong-Ah Choi, Suresh Subramaniam, Hongsik Choi:
NCAC: Network Congestion Analyzer and Controller. 68-70 - Crispin Cowan:
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. 71-72 - Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred:
DDoS Tolerant Networks. 73-75 - Roger Knobbe, Andrew Purtell:
Guaranteed Internet Stack Utilization (GINSU) Building Blocks. 76-77 - Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott O. Bradner:
ANON: An IP-Layer Anonymizing Infrastructure. 78-80 - Tom Markham, Lynn Meredith, Charlie Payne:
Distributed Embedded Firewalls with Virtual Private Groups. 81-83 - Wesley Griffin, Russ Mundy, Sam Weiler, Dan Massey, Naheed Vora:
Fault-Tolerant Mesh of Trust Applied to DNS Security. 84-86 - Louise E. Moser, P. M. Melliar-Smith:
Demonstration of Fault Tolerance for CORBA Applications. 87-89 - Todd Hughes, Mike Junod, Andy Muckelbauer:
Dynamic Trust-based Resource Allocation. 90 - Sandra Murphy, Abhijit Hayatnagarkar, Suresh Krishnaswamy, Wayne Morrison, Robert Watson:
Active Network Fault Response. 91-93 - Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan:
COSSACK: Coordinated Suppression of Simultaneous Attacks. 94-96 - Kihong Park:
Scalable DDoS Protection Using Route-Based Filtering. 97-97 - Ranga S. Ramanujan, S. Kudige, T. Nguyen:
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA). 98-100 - Max Robinson, Jelena Mirkovic, B. Scott Michel, Matthew Schnaider, Peter L. Reiher:
DefCOM: Defensive Cooperative Overlay Mesh. 101-102 - Scott Rose, Kevin Bowers, Stephen Quirolgico, Kevin Mills:
Improving Failure Responsiveness in Jini Leasing. 103-105 - W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge:
SPIE Demonstration: Single Packet Traceback. 106-107 - Paul F. Syverson:
Onion Routing for Resistance to Traffic Analysis. 108-110 - Roshan K. Thomas, Hong Zhu, Tim Huck, Tommy Johnson:
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. 111 - Joseph D. Touch, Lars Eggert, Yu-Shun Wang:
TetherNet Anti-NAT - Secure Internet Subnet Rental System. 112-
Organically Assured and Survivable Information Systems (OASIS)
- Robert Balzer:
Safe Email, Safe Office, and Safe Web Browser. 116 - Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization. 117-119 - Mark Feldman:
Enterprise Wrappers for Information Assurance. 120-122 - John C. Knight, Jonathan Hill, Philip E. Varner, Premkumar T. Devanbu, Alexander L. Wolf, Dennis Heimbigner:
Willow System Demonstration. 123-125 - William Weinstein, Janet Lepanto:
Camouflage of Network Traffic to Resist Attack (CONTRA). 126-127 - Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo. 128-130 - Peng Liu:
ITDB: An Attack Self-Healing Database System Prototype. 131-133 - D. O'Brien:
Intrusion Tolerant Web Servers via Network Layer Controls. 134 - P. Pal:
Demonstrating Intrusion Tolerance With ITUA. 135-137 - Ranga S. Ramanujan, Maher Kaddoura, J. Wu, C. Sanders, K. Millikin:
VPNshield: Protecing VPN Services from Denial-of-Service (DoS) Attacks. 138-139 - J. Reynolds:
On-Line Attack Prevention and Continual Recovery. 140-142 - Viren Shah, Frank Hill:
An Aspect-Oriented Security Framework. 143-145 - J. Shukla:
OmniVPN. 146 - Matthew Stillerman, Dexter Kozen:
Efficient Code Certification for Open Firmware. 147-148 - Gregg Tally, Brent Whitmore, David Sames, Brian Matt, Brian Niebuhr, David E. Bakken:
Intrusion Tolerant Distributed Object Systems: Project Summary. 149-151 - Tom Van Vleck, Andrew Reisse:
SPMA - Java Binary Enhancement Tool. 152 - Feiyi Wang, Raghu Upppalli:
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary. 153-
Operational Experimentation (OPX)
- M. Miller:
System Detection's Hawkeye Platform. 158-
Composable High Assurance Trusted Systems (CHATS)
- Myla Archer, Elizabeth I. Leonard, Matteo Pradella:
Modeling Security-Enhanced Linux Policy Specifications for Analysis. 164-169 - Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida:
Open-Source PKI on SELinux. 170-175 - Cynthia E. Irvine, David J. Shifflett, Paul C. Clark, Timothy E. Levin, George W. Dinolt:
Monterey Security Enhanced Architecture Project. 176-181 - Peter G. Neumann:
Achieving Principled Assuredly Trustworthy Composable Systems and Networks. 182-187 - Hans T. Reiser:
Enhancing ReiserFS Security In Linux. 188-
Cyber Panel
- Anita D'Amico, Stephen Salas:
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches. 190-195 - Joshua W. Haines, Stephen A. Goulet, Robert S. Durst, Terrence G. Champion:
LLSIM: Network Simulation for Correlation and Response Testing. 196-201 - Calvin Ko, Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary. 202-207 - John J. Shaw:
Predicting the Impact of Cyber-Attacks on BMC3 Enterprises. 208-
Dynamic Coalitions (DC)
- Vijay G. Bharadwaj, John S. Baras:
A Framework for Automated Negotiation of Access Control Policies. 216-221 - Weifeng Chen, Lakshminath R. Dondeti:
Recommendations in Using Group Key Management Algorithms. 222-227 - Jeffrey Kay, Steve Crocker:
DyCER: A Lightweight Data Sharing System Using Replication. 228-233 - Patrick D. McDaniel, Atul Prakash:
A Flexible Architecture for Security Policy Enforcement. 234-239 - Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu:
Trust Negotiation in Dynamic Coalitions. 240-245 - Michael T. Goodrich, Roberto Tamassia:
Efficient and Scalable Infrastructure Support for Dynamic Coalitions. 246-251 - William H. Winsborough, Jay Jacobs:
Automated Trust Negotiation in Attribute-based Access Control. 252-
Fault Tolerant Networks (FTN)
- Lynn M. Meredith:
A Summary of the Autonomic Distributed Firewalls (ADF) Project. 260-265 - W. Timothy Strayer, Christine E. Jones, Fabrice Tchakountio, Alex C. Snoeren, Beverly Schwartz, Robert C. Clements, Matthew Condell, Craig Partridge:
Traceback of Single IP Packets Using SPIE. 266-270 - Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, Lars Eggert:
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays. 271-276 - Xiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves:
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. 277-
Organically Assured and Survivable Information Systems (OASIS)
- Peng Liu:
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components. 284-289 - Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email. 290-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.