Progress Report on the LTS / UMIACS Contract RFP : MDA 904 - 02 - R - 0151 – SOW : R 4 - 02 - 0001 . 1 January 31 , 2004

نویسندگان

  • Joseph JaJa
  • Mark Shayman
  • Samrat Bhattacharjee
  • Steve Marcus
  • Ray Chen
چکیده

We first present a protocol for anonymous communication over the Internet. Ourprotocol, called P5 (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-,and sender-receiver anonymity. P5 is designed to be implemented over the currentInternet protocols, and does not require any special infrastructure support. We present anoutline of the P5 protocol, and a set of performance results based on detailed simulations. We next present a low-overhead media streaming system, called SRMS (ScalableResilient Media Streaming) that scales to very large groups. SRMS leverages aprobabilistic loss recovery technique to provide high data delivery guarantees even underlarge network losses and overlay node failures. We describe the randomized protcols thatare used to provide resilience in SRMS, and present simulation and implementationresults showing its efficacy in practice. November 5, 2003 Randomized Algorithms for Network Security and Peer-to-PeerSystemsSpeaker: Micah AdlerUniversity of Massachusetts at Amherst AbstractThis presentation will consist of two independent shorter talks, with a question andanswer period in between. The first talk will consider probabilistic packet marking(PPM) for IP Traceback. PPM is a technique for tracing a sequence of network packetsback to an anonymous source. An important consideration for such schemes is $b$, thenumber of packet header bits that need to be allocated to the marking protocol. In thistalk, we introduce a new PPM scheme applicable when a sequence of packets is sentalong the same path. This new technique allows the packets to be traced back to theirsource using only a single bit in the packet header. With this scheme, the number ofpackets required to reconstruct the path is $O(2^{2n})$, but we also show that it is notThis presentation will consist of two independent shorter talks, with a question andanswer period in between. The first talk will consider probabilistic packet marking(PPM) for IP Traceback. PPM is a technique for tracing a sequence of network packetsback to an anonymous source. An important consideration for such schemes is $b$, thenumber of packet header bits that need to be allocated to the marking protocol. In thistalk, we introduce a new PPM scheme applicable when a sequence of packets is sentalong the same path. This new technique allows the packets to be traced back to theirsource using only a single bit in the packet header. With this scheme, the number ofpackets required to reconstruct the path is $O(2^{2n})$, but we also show that it is not

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Progress Report on the LTS / UMIACS Contract RFP : MDA 904 - 02 - R - 0151 – SOW : R 4 - 02 - 0001

We previously developed a distributed DDoS detection system to detect TCP attacks originating from within the AS. The detection system consists of monitors which are deployed at different routers in the AS and which sample the network traffic. The traffic profiles collected at different monitors are correlated to detect DoS attacks and suppress false positives. We modified the algorithms at the...

متن کامل

Progress Report on the LTS / UMIACS Contract RFP : MDA 904 - 02 - R - 0151 – SOW : R 4 - 02 - 0001

We have developed an overlay based distributed DDoS detection system which is deployed within an AS and detects TCP based DoS attacks that originate in the AS by monitoring the network traffic. The detection system has several "monitors" which are co-located with the routers in the AS. These monitors poll the bidirectional traffic transiting through the co-located router with a chosen probabili...

متن کامل

On Completeness of Pseudodimple Sets

The paper contains completeness criterions for pseudosimple sets. Those criterions are constructed using e ectivization of the de nitions as well as extensionally bounded functions.

متن کامل

Empowering respiratory therapists to take a more active role in delivering quality care for infants with bronchiolitis.

BACKGROUND Cincinnati Children's Hospital Medical Center developed a bronchiolitis-treatment guideline and implemented a program, led by respiratory therapists, to encourage the use of respiratory function assessment to determine the need for and effect of bronchodilator treatment of infant bronchiolitis patients. METHODS The program was implemented on January 14, 2002, and included (1). a re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004