Back to Results
First PageMeta Content
Peer-to-peer / Bloom filter / Cyberwarfare / Cryptographic hash function / Detective / Denial-of-service attack / ANts P2P / Computer security / Hashing / File sharing networks / Computing


Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman† , Ethan Blanton‡ , Vern Paxson† , Scott Shenker† Computer Science Institute, ‡ Purdue University † International
Add to Reading List

Document Date: 2006-11-16 13:20:37


Open Document

File Size: 68,15 KB

Share Result on Facebook

Facility

Scott Shenker† Computer Science Institute / Purdue University / port X / /

IndustryTerm

remote server / database server / benign communications channels / code server / alternate hash algorithms / intrusion detection systems / Internet Forensic Analysis / unsavory web server / traffic monitoring devices / code-distribution server / /

Organization

National Science Foundation / Scott Shenker† Computer Science Institute / Purdue University / Interpol / /

Person

Robert Walsh / Tim Strayer / Wi / Robin Sommer / Ethan Blanton / Doug Maughn / Stream Searching / Carl Livadas / Mark Allman / Marina Blanton / David Lapsley / Jason Franklin / /

Position

rogue detective / candidate for continued investigation / collector / actor / querying detective / detective / known bad actor / Private / judge / controller / /

ProgrammingLanguage

SQL / C / K / /

Technology

encryption / alternate hash algorithms / HTTP / Operating System / web server / /

SocialTag