TetherNet Anti-NAT - Secure Internet Subnet Rental System (English)
- New search for: Touch, J.
- New search for: Eggert, L.
- New search for: Wang, Y.
- New search for: Defense Advanced Research Projects Agency
- New search for: IEEE
- New search for: Touch, J.
- New search for: Eggert, L.
- New search for: Wang, Y.
- New search for: Defense Advanced Research Projects Agency
- New search for: IEEE
In:
Information survivability conference and exposition; DARPA
;
112-115
;
2003
-
ISBN:
- Conference paper / Print
-
Title:TetherNet Anti-NAT - Secure Internet Subnet Rental System
-
Contributors:Touch, J. ( author ) / Eggert, L. ( author ) / Wang, Y. ( author ) / Defense Advanced Research Projects Agency / IEEE
-
Conference:3rd, Information survivability conference and exposition; DARPA ; 2003 ; Washington, DC
-
Published in:
-
Publisher:
- New search for: IEEE Computer Society
-
Place of publication:Los Alamitos, CA
-
Publication date:2003-01-01
-
Size:4 pages
-
Remarks:Also known as DISCEX 03
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
Cossack: coordinated suppression of simultaneous attacksPapadopoulos, C. / Lindell, R. / Mehringer, J. / Hussain, A. / Govindan, R. et al. | 2003
- 4
-
Open-source PKI on SELinux - a technology descriptionBubnis, E. / Evans, S. / Fischer, P. / Meighan, E. / Almeida, A. et al. | 2003
- 7
-
Demonstration of COSAK static analysis toolsDaCosta, D. / Dahn, C. / Mancoridis, S. / Prevelakis, V. et al. | 2003
- 10
-
MYSEA technology demonstrationIrvine, C. / Shifflett, D. / Clark, P. / Levin, T. / Dinolt, G. et al. | 2003
- 13
-
The TrustedBSD MAC FrameworkWatson, R. / Feldman, B. / Migus, A. / Vance, C. et al. | 2003
- 14
-
NetBouncer: client-legitimacy-based high-performance DDoS filteringThomas, R. / Mark, B. / Johnson, T. / Croall, J. et al. | 2003
- 18
-
Visualization as an aid for assessing the mission impact of information security breachesD'Amico, A. / Salas, S. et al. | 2003
- 21
-
A controller-based autonomic defense systemArmstrong, D. / Frazier, G. / Carter, S. / Frazier, T. et al. | 2003
- 24
-
Scyllarus intrusion detection report correlator and analyzerHeimerdinger, W. et al. | 2003
- 26
-
Analyzing interaction between distributed denial of service attacks and mitigation technologiesBlackert, W.J. / Gregg, D.M. / Castner, A.K. / Kyle, E.M. / Hom, R.L. / Jokerst, R.M. et al. | 2003
- 27
-
System health and intrusion monitoring: technology descriptionKo, C. et al. | 2003
- 30
-
CIRCADIA demonstration: active adaptive defenseMusliner, D. et al. | 2003
- 32
-
An integrated cyber panel systemTinnel, L.S. / Saydjari, O.S. / Haines, J.W. et al. | 2003
- 35 vol.2
-
Intelligence Preparation of the Information Battlespace (IPIB)Williams, J. et al. | 2003
- 38
-
Integrated security services for dynamic coalitionsKhurana, H. / Gavrila, S. / Bobba, R. / Koleva, R. / Sonalker, A. / Dinu, E. / Gligor, V. / Baras, J. et al. | 2003
- 38
-
Design and implementation of the Trusted BSD MAC frameworkWatson, R. / Feldman, B. / Migus, A. / Vance, C. et al. | 2003
- 41
-
Key management for secure multicast group communication in mobile networksKostas, T. / Kiwior, D. / Rajappan, G. / Dalal, M. et al. | 2003
- 44
-
Antigone: policy-based secure group communication system and AMirD: Antigone-based secure file mirroring systemIrrer, J. / Prakash, A. / McDaniel, P. et al. | 2003
- 47
-
Federated security management for dynamic coalitionsBhatt, S. / Raj Rajagopalan, S. / Rao, P. et al. | 2003
- 49
-
TrustBuilder: negotiating trust in dynamic coalitionsSeamons, K.E. / Chan, T. / Child, E. / Halcrow, M. / Hess, A. / Holt, J. / Jacobson, J. / Jarvis, R. / Patty, A. / Smith, B. et al. | 2003
- 50
-
Dynamic authorization and intrusion response in distributed systemsRyutov, T. / Neuman, C. / Kim, D. et al. | 2003
- 52
-
Yalta: a dynamic PKI and secure tuplespaces for distributed coalitionsSmith, T.J. / Byrd, G.T. et al. | 2003
- 55
-
A toolkit for building secure, fault-tolerant virtual private networksStephens, W. / Coan, B. / Narain, S. / Kaul, V. / Parmeswaran, K. / Cheng, T. et al. | 2003
- 58
-
Distributed data authenticationGoodrich, M.T. / Shin, M. / Straub, C.D. / Tamassia, R. et al. | 2003
- 60
-
Automated trust negotiation technology with attribute-based access controlWinsborough, W.H. / Jacobs, J. et al. | 2003
- 62
-
Design and analysis of an IP-Layer anonymizing infrastructureKung, H.T. / Chen-Mou Cheng, / Koan-Sin Tan, / Bradner, S. et al. | 2003
- 64
-
The Wackamole approach to fault tolerant networksAmir, Y. / Caudy, R. / Munjal, A. / Schlossnagle, T. / Tutu, C. et al. | 2003
- 66
-
Distributed denial of service defense attack tradeoff analysis (DDOS-DATA)Blackert, W.J. / Gregg, D.M. / Castner, A.K. / Hom, R.L. / Jokerst, R.M. / Kyle, E.M. et al. | 2003
- 68
-
NCAC: Network Congestion Analyzer and ControllerHyeong-Ah Choi, / Subramaniam, S. / Hongsik Choi, et al. | 2003
- 71
-
Defcon Capture the Flag: defending vulnerable code from intense attackCowan, C. et al. | 2003
- 73
-
DDoS tolerant networksFeinstein, L. / Schnackenberg, D. / Balupari, R. / Kindred, D. et al. | 2003
- 76
-
Guaranteed Internet Stack Utilization (GINSU) building blocksKnobbe, R. / Purtell, A. et al. | 2003
- 78
-
ANON: an IP-layer anonymizing infrastructureChen-Mou Cheng, / Kung, H.T. / Koan-Sin Tan, / Bradner, S. et al. | 2003
- 78
-
Towards a rigorous definition of information system survivabilityKnight, J.C. / Strunk, E.A. / Sullivan, K.J. et al. | 2003
- 81
-
Distributed embedded firewalls with virtual private groupsMarkham, T. / Meredith, L. / Payne, C. et al. | 2003
- 84
-
Fault-tolerant mesh of trust applied to DNS securityGriffin, W. / Mundy, R. / Weiler, S. / Massey, D. / Vora, N. et al. | 2003
- 87
-
Demonstration of fault tolerance for CORBA applicationsMoser, L. / Melliar-Smith, M. et al. | 2003
- 90
-
Intrusion tolerance via network layer controlsO'Brien, D. / Smith, R. / Kappel, T. / Bitzer, C. et al. | 2003
- 90 vol.2
-
Dynamic trust-based resource allocationHughes, T. / Junod, M. / Muckelbauer, P.A. et al. | 2003
- 91
-
Active Network Fault ResponseMurphy, S. / Hayatnagarkar, A. / Krishnaswainy, S. / Morrison, W. / Watson, R. et al. | 2003
- 97
-
Scalable DDoS Protection Using Route-Based FilteringPark, K. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 97
-
Prophylactic, treatment and containment techniques for ensuring active network securityMurphy, S. / Hayatnagarkar, A. / Krishnaswamy, S. / Morrison, W. / Watson, R. et al. | 2003
- 97 vol.2
-
Scalable DDoS protection using route-based filtering - DISCEX III demonstrationKihong Park, et al. | 2003
- 98
-
Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)Ramanujan, R. / Kudige, S. / Nguyen, T. et al. | 2003
- 101
-
DefCOM: defensive cooperative overlay meshRobinson, M. / Mirkovic, J. / Michel, S. / Schnaider, M. / Reiher, P. et al. | 2003
- 103
-
Improving failure responsiveness in Jini leasingRose, S. / Bowers, K. / Quirolgico, S. / Mills, K. et al. | 2003
- 106
-
SPIE demonstration: single packet tracebackStrayer, W.T. / Jones, C.E. / Tchakountio, F. / Snoeren, A.C. et al. | 2003
- 108
-
Onion routing for resistance to traffic analysisSyverson, P. et al. | 2003
- 110
-
Lessons learned in using live red teams in IA experimentsLevin, D. et al. | 2003
- 112
-
TetherNet Anti-NAT-secure Internet subnet rental systemTouch, J.D. / Eggert, L. / Yu-Shun Wang, et al. | 2003
- 116
-
Safe Email, Safe Office, and Safe Web BrowserBalzer, R. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 116 vol.2
-
Safe email, safe office, and safe web browser demo descriptionBalzer, R. et al. | 2003
- 117
-
Access control on the Web using proof-carrying authorizationBauer, L. / Schneider, M.A. / Felten, E.W. / Appel, A.W. et al. | 2003
- 120
-
Enterprise wrappers for information assuranceFeldman, M. et al. | 2003
- 123
-
Willow system demonstrationKnight, J.C. / Hill, J. / Varner, P. / Wolf, A.L. / Heimbigner, D. / Devanbu, P. et al. | 2003
- 126
-
Camouflage of network traffic to resist attack (CONTRA)Weinstein, W. / Lepanto, J. et al. | 2003
- 128
-
Dependable Intrusion Tolerance: technology demoValdes, A. / Almgren, M. / Cheung, S. / Deswarte, Y. / Dutertre, B. / Levy, J. / Saidi, H. / Stavridou, V. / Uribe, T.E. et al. | 2003
- 130
-
Surveillance detection in high bandwidth environmentsRobertson, S. / Siegel, E.V. / Miller, M. / Stolfo, S.J. et al. | 2003
- 131
-
ITDB: an attack self-healing database system prototypePeng Liu, et al. | 2003
- 134
-
Intrustion Tolerant Web Servers via Network Layer ControlsO Brien, D. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 134 vol.2
-
Intrusion tolerant Web servers via network layer controlsO'Brien, D. et al. | 2003
- 135
-
Demonstrating intrusion tolerance with ITUAPal, P. et al. | 2003
- 138
-
VPNshield: protecting VPN services from denial-of-service (DoS) attacksRamanujan, R. / Kaddoura, M. / Wu, J. / Sanders, C. / Millikin, K. et al. | 2003
- 140
-
On-line attack prevention and continual recoveryReynolds, J. et al. | 2003
- 140
-
Detecting novel scans through pattern anomaly detectionValdes, A. et al. | 2003
- 143
-
An aspect-oriented security frameworkShah, V. / Hill, F. et al. | 2003
- 143
-
An Aspect-Oriented Security SolutionShah, V. / Hill, F. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 146 vol.2
-
OmniVPNShukla, J. et al. | 2003
- 147
-
Efficient code certification for open firmwareStillerman, M. / Kozen, D. et al. | 2003
- 149
-
Intrusion Tolerant Distributed Object SystemsTally, G. / Whitmore, B. / Sames, D. / Matt, B. / Niebuhr, B. / Bakken, D. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 149
-
Intrusion tolerant distributed object systems: project summaryTally, G. / Whitmore, B. / Sames, D. / Matt, B. / Niebuhr, B. / Bakken, D. et al. | 2003
- 152
-
Finding the vocabulary of program behavior data for anomaly detectionMichael, C.C. et al. | 2003
- 152 vol.2
-
SPMA - Java Binary Enhancement ToolVan Vleck, T. / Reisse, A. et al. | 2003
- 153
-
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed ServicesWang, F. / Uppalli, R. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 153
-
SITAR: a scalable intrusion-tolerant architecture for distributed services - a technology summaryFeiyi Wang, / Upppalli, R. et al. | 2003
- 158
-
System Detection's Hawkeye platformMiller, M. et al. | 2003
- 164
-
Modeling security-enhanced Linux policy specifications for analysisArcher, M. / Leonard, E. / Pradella, M. et al. | 2003
- 164
-
Detecting spoofed packetsTempleton, S.J. / Levitt, K.E. et al. | 2003
- 170
-
Open-source PKI on SELinuxBubnis, E. / Evans, S. / Fischer, P. / Meighan, E. / Almeida, A. et al. | 2003
- 176
-
Monterey security enhanced architecture projectIrvine, C. / Shifflett, D. / Clark, P. / Levin, T. / Dinolt, G. et al. | 2003
- 178
-
The STRONGMAN architectureKeromytis, A.D. / Ioannidis, S. / Greenwald, M.B. / Smith, J.M. et al. | 2003
- 182
-
Achieving principled assuredly trustworthy composable systems and networksNeumann, P.G. et al. | 2003
- 188 vol.2
-
Enhancing ReiserFS security in linuxReiser, H.T. et al. | 2003
- 189
-
Dynamic PKI and secure tuplespaces for distributed coalitionsSmith, T.J. / Byrd, G.T. / Xiaoyong Wu, / Hongjie Xin, / Thangavelu, K. / Wang, R. / Shah, A. et al. | 2003
- 196
-
LLSIM: network simulation for correlation and response testingHaines, J.W. / Goulet, S.A. / Durst, R.S. / Champion, T.G. et al. | 2003
- 201
-
RT: a Role-based Trust-management frameworkNinghui Li, / Mitchell, J.C. et al. | 2003
- 202
-
System health and intrusion monitoring (SHIM): project summaryKo, C. et al. | 2003
- 208
-
Predicting the impact of cyber-attacks on BMC/sup 3/ enterprisesShaw, J.J. et al. | 2003
- 208
-
Predicting the Impact of Cyber-Attacks on BMC^3EnterprisesShaw, J. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 214
-
Understanding BGP behavior through a study of DoD prefixesXiaoliang Zhao, / Massey, D. / Wu, S.F. / Lad, M. / Pei, D. / Lan Wang, / Lixia Zhang, et al. | 2003
- 216
-
A framework for automated negotiation of access control policiesBharadwaj, V.G. / Baras, J.S. et al. | 2003
- 222
-
Recommendations in using group key management algorithmsWeifeng Chen, / Dondeti, L.R. et al. | 2003
- 226
-
Scaling secure group communication systems: beyond peer-to-peerAmir, Y. / Nita-Rotaru, C. / Stanton, J. / Tsudik, G. et al. | 2003
- 228
-
DyCER: a lightweight data sharing system using replicationKay, J. / Crocker, S. et al. | 2003
- 234
-
A flexible architecture for security policy enforcementMcDaniel, P. / Prakash, A. et al. | 2003
- 238
-
MuCAPSLMillen, J. / Denker, G. et al. | 2003
- 240
-
Trust Negotiation in Dynamic CoalitionsSeamons, K.E. / Winslett, M. / Ting Yu, / Chan, T. / Child, E. / Halcrow, M. / Hess, A. / Holt, J. / Jacobson, J. / Jarvis, R. et al. | 2003
- 246
-
Efficient and scalable infrastructure support for dynamic coalitionsGoodrich, M.T. / Tarnassia, R. et al. | 2003
- 252
-
Automated trust negotiation in attribute-based access controlWinsborough, W.H. / Jacobs, J. et al. | 2003
- 252
-
Efficient alarm management in optical networksStanic, S. / Subramaniam, S. / Hongsik Choi, / Sahin, G. / Hyeong-Ah Choi, et al. | 2003
- 260
-
A summary of the Autonomic Distributed Firewalls (ADF) projectMeredith, L.M. et al. | 2003
- 261
-
Leader election algorithms for wireless ad hoc networksVasudevan, S. / DeCleene, B. / Immerman, N. / Kurose, J. / Towsley, D. et al. | 2003
- 266
-
Traceback of single IP packets using SPIEStrayer, W.T. / Jones, C.E. / Tchakountio, F. / Snoeren, A.C. / Schwartz, B. / Clements, R.C. / Condell, M. / Partridge, C. et al. | 2003
- 271
-
DynaBone: dynamic defense using multi-layer Internet overlaysTouch, J.D. / Finn, G.G. / Yu-Shun Wang, / Eggert, L. et al. | 2003
- 273
-
Interactions between TCP and the IEEE 802.11 MAC protocolRui Jiang, / Gupta, V. / Ravishankar, C.V. et al. | 2003
- 277
-
A summary of detection of denial-of-QoS attacks on DiffServ networksXiaoyong Wu, / Mahadik, V.A. / Reeves, D.S. et al. | 2003
- 284
-
Engineering a distributed intrusion tolerant database system using COTS componentsPeng Liu, et al. | 2003
- 284
-
Modeling multistep cyber attacks for scenario recognitionCheung, S. / Lindqvist, U. / Fong, M.W. et al. | 2003
- 290
-
EMT/MET: systems for modeling and detecting errant emailStolfo, S.J. / Hershkop, S. / Ke Wang, / Nimeskern, O. et al. | 2003
- 293
-
Cooperative response strategies for large scale attack mitigationNojiri, D. / Rowe, J. / Levitt, K. et al. | 2003
- 297
-
Author index volume II| 2003
- 303
-
Statistical approaches to DDoS attack detection and responseFeinstein, L. / Schnackenberg, D. / Balupari, R. / Kindred, D. et al. | 2003
- 315
-
Author index volume I| 2003
- i
-
Proceedings DARPA Information Survivability Conference And Exposition| 2003