| Stress Testing Cluster Bro | N. Weaver and R. Sommer | Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007), Boston, Massachusetts | August 2007 | Networking | [PDF]
|
| On the Adaptive Real-Time Detection of Fast-Propagating Network Worms | J. Jung, R. Milito, and V. Paxson | Proceedings of the Fourth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2007), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, No. 1, pp. 197-210, February 2008 | July 2007 | Networking | [PDF]
|
| Determining an Appropriate Sending Rate Over an Underutilized Network Path | P. Sarolahti, M. Allman, and S. Floyd | Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 7, pp. 1815-1832. DOI:10.1016/j.comnet.2006.11.006 | May 2007 | Networking | [PDF]
|
| An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention | V. Paxson, R. Sommer, and N. Weaver | Proceedings of IEEE Sarnoff Symposium, Princeton, New Jersey, pp. 1-7 | May 2007 | Networking | [PDF]
|
| X-Trace: A Pervasive Network Tracing Framework | R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica | Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007), Cambridge, Massachusetts, pp. 271-284 | April 2007 | Networking | [PDF]
|
| RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant | S. Floyd and E. Kohler | RFC 4828, Experimental | April 2007 | Networking | [PDF]
|
| A Declarative Sensornet Architecture | A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 55-60 | April 2007 | Networking | [PDF]
|
| A Modular Sensornet Architecture: Past, Present, and Future Directions | A. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 49-54 | April 2007 | Networking | [PDF]
|
| An Architecture for Energy Management in Wireless Sensor Networks | X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker | Proceedings of the International Workshop on Wireless Sensor Network Architecture (WWSNA 2007), Cambridge, Massachusetts, pp. 31-36 | April 2007 | Networking | [PDF]
|
| The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention | N. Weaver, V. Paxson, and J.M. Gonzalez | Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007), Monterey, California, pp. 199-206 | February 2007 | Networking | [PDF]
|
| Congestion Control Without a Startup Phase | D. Liu, M. Allman, S. Jin, and L. Wang | Proceedings of the Fifth International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet 2007), Los Angeles, California | February 2007 | Networking | [PDF]
|
| RFC 4782 Quick-Start for TCP and IP | S. Floyd, M. Allman, A. Jain, and P. Sarolahti | Request For Comments 4782 | January 2007 | Networking | [PDF]
|
| Distributed Algorithmic Mechanism Design | J. Feigenbaum, M. Schapira, and S. Shenker | In Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, eds., pp. 363-384, Cambridge University Press | 2007 | Networking | |
| Very Fast Containment of Scanning Worms, Revisited | N. Weaver, S. Staniford, and V. Paxson | In Malware Detection: Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, eds., pp. 113-145, Springer | 2007 | Networking | |
| Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network | S. Kim, R. Fonseca, P.K. Dutta, A. Tavakoli, D.E. Culler, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. UCB/EECS-2006-169, Berkeley, California | December 12 2006 | Networking | |
| Observed Structure of Addresses in IP Traffic | E. Kohler, J. Li, V. Paxson, and S. Shenker | IEEE/ACM Transactions on Networking, Vol. 14, No. 6, pp. 1207-1218 | December 2006 | Networking | [PDF]
|
| Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications | A. Parker, S. Reddy, T. Schmid, K. Chang, G. Saurabh, M. Srivastava, M. Hansen, J. Burke, D. Estrin, M. Allman, and V. Paxson | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 37-42 | November 2006 | Networking | [PDF]
|
| Fighting Coordinated Attackers with Cross-Organizational Information on Sharing | M. Allman, E. Blanton, V. Paxson, and S. Shenker | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California | November 2006 | Networking | [PDF]
|
| RFC 4774: Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field | S. Floyd | Request For Comments 4774, Best Current Practice | November 2006 | Networking | [PDF]
|
| Service Portability: Why http Redirect is the Model for the Future | S. Singh, S. Shenker, and G. Varghese | Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V), Irvine, California, pp. 49-54 | November 2006 | Networking | [PDF]
|
| A Modular Network Layer for Sensornets | C.T. Ee, R. Fonseca, S. Kim, D. Moon, A. Tavakoli, D. Culler, S. Shenker, and I. Stoica | Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, pp. 249-262 | November 2006 | Networking | [PDF]
|
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| binpac: A yacc for Writing Application Protocol Parsers | R. Pang, V. Paxson, R. Sommer, and L. Peterson | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 289-300 | October 2006 | Networking | [PDF]
|
| Semi-Automated Discovery of Application Session Structure | J. Kannan, J. Jung, V. Paxson, and C. Koksal | Proceedings of the Internet Measurement Conference 2006 (IMC 2006), Rio de Janeiro, Brazil, pp. 119-132 | October 2006 | Networking | [PDF]
|
| The Design and Implementation of a Declarative Sensor Network System | D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica | EECS Department, UC Berkeley Technical Report No. EECS-2006-132, Berkeley, California | October 2006 | Networking | |
| Designing DCCP: Congestion Control Without Reliability | E. Kohler, M. Handley, and S. Floyd | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 27-38 | September 2006 | Networking | [PDF]
|
| Enhancing Network Intrusion Detection With Integrated Sampling and Filtering | J. Gonzalez and V. Paxson | Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, pp. 272-289 | September 2006 | Networking | [PDF]
|
| Revisiting IP Multicast | S. Ratnasamy, A. Ermolinskiy, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 15-26 | September 2006 | Networking | [PDF]
|
| Minimizing Churn in Distributed Systems | P. B. Godfrey, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 147-158 | September 2006 | Networking | [PDF]
|
| ROFL: Routing on Flat Labels | M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. Stoica | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 363-374 | September 2006 | Networking | [PDF]
|
| DDoS Defense by Offense | M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006), Pisa, Italy, pp. 303-314 | September 2006 | Networking | [PDF]
|
| Improving Delivery Ratio and Power Efficiency in Unicast Geographic Routing with a Realistic Physical Layer for Wireless Sensor Networks | J.A. Sanchez and P. M. Ruiz | Proceedings of the 9th Euromicro Conference on Digital System Design Architectures, Methods, and Tools (DSD 2006), Drubovnid, Croatia | September 2006 | Networking | |
| A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4217, pp. 459–470 | September 2006 | Networking | |
| GMR: Geographic Multicast Routing for Wireless Sensor Networks | J.A. Sanchez, P. M. Ruiz, and I. Stojmenovic | Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Networks (IEEE SECON 2006), Reston, Virginia | September 2006 | Networking | |
| Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver | Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer | Proceedings of the 15th USENIX Security Symposium (Security '06), Vancouver, Canada | August 2006 | Networking | [PDF]
|
| Incremental Deployment Strategies for Router-Assisted Reliable Multicast | X. He, C. Papadopoulos, and P. Radoslavov | IEEE/ACM Transactions on Networking, Vol. 14, Issue 4, pp. 779-792 | August 2006 | Networking | |
| SANE: A Protection Architecture for Enterprise Networks | M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker | Proceedings of the 15th USENIX Security Symposium (Security '05), Vancouver, Canada, pp. 137–151 | August 2006 | Networking | [PDF]
|
| RFC 4653: Improving the Robustness of TCP to Non-Congestion Events | S. Bhandarkar, A.L.N. Reddy, M. Allman, and E. Blanton | Request for Comments 4653 (Experimental) | August 2006 | Networking | |
| Network Loss Tomography Using Striped Unicast Probes | N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley | IEEE/ACM Transactions on Networking, Vol. 14 Issue 4, pp. 697-710 | August 2006 | Networking | [PDF]
|
| Tracking the Role of Adversaries in Measuring Unwanted Traffic | M. Allman, P. Barford, B. Krishnamurty, and J. Wang | Proceedings of the Second Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), San Jose, California, p. 6 | July 2006 | Networking | [PDF]
|
| Energy-Efficient Routing on the Virtual Spanner | H. Tejeda, E. Chavez, J.A. Sanchez, and P. M. Ruiz | Lecture Notes in Computer Science, Vol. 4104, pp. 101–113 | July 2006 | Networking | |
| Incentive-Compatible Interdomain Routing | J. Feigenbaum, V. Ramachandran, and M. Schapira | Proceedings of the 7th ACM Conference on Electronic Commerce (EC'06), Ann Arbor, Michigan, pp. 130-139 | June 2006 | Networking | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| Replay Debugging for Distributed Applications | D. Geels, G. Altekar, S. Shenker, and I. Stoica | Proceedings of the 2006 USENIX Annual Technical Conference (best paper), Boston, Massachusetts, pp. 289-300 | May 2006 | Networking | [PDF]
|
| End-Host Controlled Multicast Routing | K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker | Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications, Vol. 5, Issue 6, pp. 807-825. DOI:10.1016/j.comnet.2005.07.019 | April 2006 | Networking | [PDF]
|
| SmartSeer: Using a DHT to Process Continuous Queries over Peer-to-Peer Networks | S. Banerjee, S. Basu, J. Kannan, S. J. Lee, P. Sharma, S. Shenker, and B. Yang | Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), Barcelona, Spain, pp. 1-12 | April 2006 | Networking | [PDF]
|
| Wireless Urban Sensing Systems | M. Srivastava, M. Hansen, J. Burke, A. Parker, S. Reddy, G. Saurabh, M. Allman, V. Paxson, and D. Estrin | Center for Embedded Network Sensing, UC Los Angeles Technical Report No. 65, Los Angeles, California | April 2006 | Networking | [PDF]
|