HTpasswd Password Protection WordPress Plugin

AskApache Password Protection, For WordPress

htpasswd-password-plugin

Plugin Page

 

This Plugin will make alot of the bots out there stop coming back, and I have found this exact type of security setup to be a great insurance policy against these types of brainless zombie bots. A few years ago I had implemented this password protection on a forum I was the security admin for, and it didn’t seem like a big improvement to very many people. The forum software we were running was phpbb, and during that Christmas break we weren’t even thinking about the forums. When we got back though the whole place was in an uproar. Some kid sent out a million of these zombie robots with a single payload- an exploit that he knew would successfully penetrate the forum’s defenses. It did.

It was like a tidal wave across the world, thats how many of these phpBB forums were hit. Thankfully all the kid did was copy the entire forum into a kind of book format, and sell it on ebay. Anyway so we looked at the logs for our server and forum, and we saw he had tried the exact same thing against us… and he did have our forum software defenses beat… You see he had his target all scoped out and meticulously researched, a nice fat range of forums needing an upgrade.. As long as they could get to the inner door (admin login) they could knock it down in seconds and own the whole thing.

Everything about the attack on our server was incredibly smooth and fast, hacked past the user login and then flew straight towards the admininstrator login… then, out of nowhere they got b**slapped because they ran full-speed into a wall that seemingly came out of nowhere, and thats exactly the same thing that you will have after installing this plugin. Its like being surrounded by a smal army, a sniper can still get you, but you can forget about the ground troops (zombies ech)

If you are worried about your WordPress blog getting hacked, this can help immensely. It adds a 2nd layer of security to your blog by requiring a username and password to access anything in the /wp-admin/ folder.

The plugin is simple, you just choose a username and password and you are done. It writes the .htaccess file, without messing it up. It also encrypts your password and creates the .htpasswd file, as well as setting the correct security-enhanced file permissions on both.

This plugin automatically picks all the right settings for where to save the .htpasswd and .htaccess files, but you can easily change those settings to anything you want. You can change it whenever you want right from your WordPress Admin Panel.

Advertisements

The Honeynet Project, List of Projects

Projects

Capture BAT

This is a behavioral analysis tool of applications for the Win32 operating system family. Capture BAT is able to monitor the state of a system during the execution of applications and processing of documents, which provides an analyst with insights on how the software operates even if no source code is available. Capture BAT monitors state changes on a low kernel level and can easily be used across various Win32 operating system versions and configurations. CaptureBAT is developed and maintained by Christian Seifert of the NZ Chapter.

Capture-HPC

Capture-HPC is a high-interaction client honeypot framework. Capture-HPC identifies malicious servers by interacting with potentially malicious servers using a dedicated virtual machine and observing its system for unauthorized state changes. Developed by Christian Seifert and Ramon Steenson of the New Zealand Chapter.

Glastopf

Web sites are hacked all the time. Web application, database, and cross-site scripting vulnerabilities expose a large attack surface that can be exploited to, among others, deface the web site, send spam, convert web site into bots, and serve drive-by-download attacks. Glastopf is a low-interaction honeypot that emulates a vulnerable web server hosting many web pages and web applications with thousands of vulnerabilities. Glastopf is easy to setup and once indexed by search engines, attacks will pour in by the thousands daily. Glastopf has been developed as part of the 2009 Google of Summer Code by student Lukas Rist (and mentored by Thorsten Holz of the German Honeynet Project Chapter). It can be downloaded from the Glastopf trac site at http://trac.glastopf.org/trac. More information on Glastopf can be found on the project site at http://glastopf.org/.

Google Hack Honeypot

Google Hack Honeypot is the reaction to a new type of malicious web traffic: search engine hackers. It is designed to provide reconnaissance against attackers that use search engines as a hacking tool. Developed by Ryan McGeehan & Brian Engert of the Chicago Chapter.

High Interaction Honeypot Analysis Toolkit (HIHAT):

This tool transforms arbitrary PHP applications into web-based high-interaction Honeypots. Apart from the possibility to create high-interaction honeypots, HIHAT furthermore comprises a graphical user interface which supports the process of monitoring the honeypot, analysing the acquired data. Last, it generates an IP-based geographical mapping of the attack sources and generates extensive statistics. HIHAT is developed and maintained by Michael Mueter of the Giraffe Chapter.

HoneyBow

HoneyBow is a high-interaction malware collection toolkit and can be integrated with nepenthes and the mwcollect Alliance’s GOTEK architecture. Developed and maintained by the Chinese Chapter.

HoneyC

HoneyC is a low interaction client honeypot framework that allows to find malicious servers on a network. Instead of using a fully functional operating system and client to perform this task, HoneyC uses emulated clients that are able to solicit as much of a response from a server that is necessary for analysis of malicious content. Developed by Christian Seifert of the New Zealand Chapter.

Honeyd

This is a low-interaction honeypot used for capturing attacker activity, very flexible. Developed and maintained by Niels Provos of the Global Chapter.

Honeymole

Honeymole: This is used for honeypot farms. You deploy multiple sensors that redirect traffic to a centralized collection of honeypots. Developed and maintained by the Portuguese Chapter.

Honeysnap

Honeysnap. Primary tool used for extracting and analyzing data from pcap files, including IRC communications. Developed and maintained by Arthur Clune of the UK Chapter.
For more information/questions, please join the mailing list (details on the project home page)

Honeystick

Honeystick: This is a bootable Honeynet from a USB device. It includes both the Honeywall and honeypots from a single, portable device. Developed and maintained by the UK Honeynet Project.

Honeytrap

This is a tool for observing novel attacks against network services by starting dymanic servers. It performs some basic data analysis and downloads malware automatically. Developed by Tillmann Werner of the Giraffe Chapter.

Honeywall CDROM

Honeywall CDROM is our primary high-interaction tool for capturing, controling and analyzing attacks. It creates an architecture that allows you to deploy both low-interaction and high-interaction honeypots, but is designed primarily for high-interaction.
For more information, please see the project TRAC page

nepenthes – the finest collection

Nepenthes is a versatile tool to collect malware. It acts passively by emulating known vulnerabilities and downloading malware trying to exploit these vulnerabilities.

Pehunter

Pehunter is a snort dynamic preprocessor that grabs Windows executables off the network. It is intended to sit inline in front of high-interactive honeypots. Developed and maintained by Tillmann Werner of the Giraffe Chapter.

PicViz – Data Visualization Tool

Picviz is a parallel coordinates[1] plotter which enables easy scripting from various input (tcpdump, syslog, iptables logs, apache logs, etc..) to visualize your data and discover interesting results quickly. This way, you can find in million of events malicious things you were not thinking about and that no regex based program would find for you.

[1] http://en.wikipedia.org/wiki/Parallel_coordinates

Sebek

Sebek is kernel module installed on high-interaction honeypots for the purpose of extensive data collection. It allows administrators to collect activities such as keystrokes on the system, even in encrypted environments. Designed primarily for Win32 and Linux systems.

Tracker

Tracker facilitates the identification of abnormal DNS activity. It will find domains that are resolving to a large number of IP’s in a short period of time then continue to track those hostname->IP mappings untill either the hostname nolonger responds or the user decides to stop tracking that hostname. Really efficient at finding fast-flux domains and other dodgy A-Record rotations. Tracker is a tool developed by the Honeynet Project Australian Chapter.



Managing Users To use user authentication, you’ll need to edit and manage user files and group files

Managing Users To use user authentication, you’ll need to edit and manage user files and group files

.


Using htpasswd to manage user files

To deal with user files, we provide a program in the support directory of the distribution called htpasswd. Usage:

htpasswd [-c] file user

The -c, if present, tells htpasswd to create a new passwd file of the specified name instead of editing an old one. file is the pathname of the user file you wish to edit. The user parameter is the name of the user you wish to add or edit.

If htpasswd finds the user you specified, it will ask you to change the user’s password. Type the new password (it will ask twice). HTTPd will then update the file.

If htpasswd doesn’t find the specified user, it will ask you to give the user an initial password.


Group files

The format of the group file is as follows:

groupname: member1 member2 ...

Or, each line contains the name of a group, and a list of members separated by spaces.



<Directory /u/Web>

Options All

<Limit GET>
order allow,deny
allow from all
</Limit>

</Directory>

<Directory /u/Web/docs/info>
AuthType Basic
AuthUserFile /usr/local/etc/httpd/conf/.htpasswd
AuthGroupFile /usr/local/etc/httpd/conf/.htgroup
</Directory>

<Directory /u/Web/docs/info/ncsaonly>
<Limit GET>
order deny,allow
deny from all
allow from .ncsa.uiuc.edu
</Limit>
</Directory>

<Directory /u/Web/docs/info/nonncsa>
<Limit GET>
order allow,deny
allow from all
deny from .ncsa.uiuc.edu
</Limit>
</Directory>

<Directory /u/Web/docs/info/carlosonly>
AuthName Carlos Gold Info
<Limit GET>
require user cvarela
</Limit>
</Directory>

<Directory /u/Web/docs/info/xmosdonly>
AuthName The X Club
<Limit GET>
require group mosaic-x-dev
</Limit>
</Directory>

<Directory /u/Web/docs/info/carlos-and-void>
AuthName Carlos Gold Info
<Limit GET>
order deny,allow
deny from all
allow from void.ncsa.uiuc.edu
require user cvarela
</Limit>
</Directory>

<Directory /u/Web/docs/info/carlos-or-void>
AuthName Carlos Gold Info
<Limit GET>
order mutual-failure
deny from all
allow from void.ncsa.uiuc.edu
require user cvarela
</Limit>
</Directory>

International Computer Science Institue Networking Articles

Publications

Networking

__/__/2009
Efficient MAC in Cognitive Radio Networks: A Game-Theoretic Approach

M. Felegyhazi, M. Cagalj, and J.-P. Hubaux

Transactions on Wireless Communications (TWC), to appear

__/__/2009
Barter Trade Improves Message Delivery in Opportunistic Networks

L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda

Elsevier Ad Hoc Networks Journal, to appear

04/__/2009
Efficient Application Placement in a Dynamic Hosting Platform

Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore

Proceedings of International World Wide Web Conference, Madrid, Spain, to appear

04/__/2009
Comments on Selecting Ephemeral Ports

M. Allman

ACM Computer Communication Review, under submission

03/__/2009
Open Source vs. Closed Source Software: Towards Measuring Security

G. Schryen and R. Kadura

Proceedings of the Annual ACM Symposium on Applied Computing, Honolulu, Hawaii, to appear

03/__/2009
Automating Analysis of Large-Scale Botnet Probing Events

Z. Li, A. Goyal, Y. Chen, and V. Paxson

Proceedings of ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, to appear

02/__/2009
Tiered Fault Tolerance for Long-Term Integrity

B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz

Proceedings of USENIX Conference on File and Storage Technologies (FAST), San Francisco, California, to appear

02/__/2009
Minuet: Rethinking Concurrency Control in Storage Area Networks

A. Ermolinskiy, D. Moon, B. Chun, and S. Shenker

Proceedings of USENIX Conference on File and Storage Technologies (FAST), San Francisco, California, to appear

02/__/2009
Detecting Forged TCP Reset Packets

N. Weaver, R. Sommer, and V. Paxson

Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS 2009), San Diego, California, to appear

__/__/2008
An Analysis of Internet Voting Security: The Case of Estonia

G. Schryen

Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, 13 December 2008. Also to appear in Lecture Notes on Business Information Processing, Springer Heidelberg

10/__/2008
Spamalytics: An Empirical Analysis of Spam Marketing Conversion

C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage

Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, pp. 3-14

10/__/2008
Revocation Games in Ephemeral Networks

M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux

Proceedings of ACM Computer and Communications Security (CCS), pp. 199-210, Alexandria, Virginia

10/__/2008
Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding

A. Ermolinskiy and S. Shenker

Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 91-96

10/__/2008
Pathlet Routing

P. B. Godfrey, S. Shenker, and I. Stoica

Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 97-102

10/__/2008
Rethinking Packet Forwarding Hardware

D. Moon, M. Casado, T. Koponen, and S. Shenker

Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (HotNets-VII), Calgary, Canada, pp. 1-6

09/__/2008
Predicting the Resource Consumption of Network Intrusion Detection Systems

H. Dreger, A. Feldmann, V. Paxson, and R. Sommer

Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Cambridge, Massachusetts, pp. 135-154

08/__/2008
Enriching Network Security Analysis with Time Travel

G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider

Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), pp. 183-194, Seattle, Washington

08/__/2008
TCP Slow Start Survey: Standards and Issues

M. Allman

IETF Internet-Draft, Draft-ietf-tcpm-early-rexmt-00.txt, in progress

08/__/2008
Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination

A. Anand, A. Gupta, A. Akella, S. Seshan, and S. Shenker

Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), San Diego, California, pp. 219-230

08/__/2008
Accountable Internet Protocol (AIP)

D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker

Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2008), Seattle, Washington, pp. 339-350

07/__/2008
RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic

S. Floyd and M. Allman

Request for Comments 5290, Informational

07/__/2008
IMRG Workshop on Application Classification and Identification Report

T. Strayer, M. Allman, G. Armitage, S. Bellovin, S. Jin and A. W. Moore

Editorial contribution to ACM Computer Communication Review, Vol. 38, Issue 3, pp. 87-90, July 2008

07/__/2008
Principles for Developing Comprehensive Network Visibility

M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver

Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California

07/__/2008
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems

L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson

Proceedings of the 5th GI International Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA), Paris, France, pp. 267-278

07/__/2008
NOX: Towards an Operating System for Networks

N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker

ACM SIGCOMM Computer Communications Review, Vol. 38, Issue 3, pp. 105-110,

06/__/2008
Diverse Replication for Single-Machine Byzantine-Fault Tolerance

B.-C. Chun, P. Maniatis, and S. Shenker

Proceedings of USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292

05/__/2008
Efficient and Robust TCP Stream Normalization

M. Vutukuru, H. Balakrishnan, and V. Paxson

Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, pp. 96-110

04/__/2008
NetComplex: A Complexity Metric for Network System Designs

B-G. Chun, S. Ratnasamy, and E. Kohler

To appear in Proceedings of NSDI 2008

04/__/2008
A Reactive Measurement Framework

M. Allman and V. Paxson

Proceedings of Passive and Active Measurement Conference, Cleveland, Ohio, pp. 92-101

04/__/2008
On Community-Oriented Internet Measurement

M. Allman, L. Martin, M. Rabinovich, and K. Atchinson

Proceedings of Passive and Active Measurement Conference, Cleveland, Ohio, pp. 112-121

04/__/2008
What Ought a Program Committee to Do?

M. Allman

Proceedings of USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS), San Francisco, California

04/__/2008
Thoughts on Reviewing

M. Allman

ACM Computer Communication Review, Vol. 38, Issue 2, pp. 47-50

04/__/2008
On the Spam Campaign Trail

C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage

Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California

04/__/2008
OpenFlow: Enabling Innovation in Campus Networks

N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner

ACM Computer Communication Review, Vol. 38, Issue 2, pp. 69-74

04/__/2008
Detecting In-Flight Page Changes with Web Tripwires

C. Reis, S. Gribble, T. Kohno, and N. Weaver

Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Fracnsico, pp. 31-44

03/__/2008
RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms

S. Floyd

RFC 5166, Information, March 2008

03/__/2008
Towards a Common TCP Evaluation Suite

L. Andrew, C. Marcondes, S. Floyd, L. Dunn, R. Guillier, W. Gang, L. Eggert, S. Ha, and I. Rhee

Proceedings of the International Workshop on Protocols for Fast Long-Distance Networks (PFLDnet), Manchester, United Kingdom

__/__/2007
Distributed Algorithmic Mechanism Design

J. Feigenbaum, M. Schapira, and S. Shenker

Chapter in Algorithmic Game Theory, Cambridge University Press, pp. 363-384

__/__/2007
A Modular Sensornet Architecture: Past, Present, and Future Directions

A. Tavakoli, P. Dutta, J. Jeong, S. Kim, J. Ortiz, P. Levis, S. Shenker

WWSNA 2007

__/__/2007
An Architecture for Energy Management in Wireless Sensor Networks

X. Jiang, J. Taneja, J. Ortiz, A. Tavakoli, P. Dutta, J. Jeong, D. Culler, P. Levis, and S. Shenker

WWSNA 2007

__/__/2007
Loss and Delay Accountability for the Internet

K. Argyraki, P. Maniatis, O. Irzak, A. Subramanian, and S. Shenker

ICNP 2007

__/__/2007
Attested Append-Only Memory: Making Adversaries Stick to their Word

B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz

SOSP 2007

11/__/2007
Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems

M. Allman, K. Christensen, B. Nordman, and V. Paxson

Proceedings of ACM Special Interest Group on Data Communications Workshop on Hot Topics in Networks (ACM SIGGCOMM HotNets-VI), Atlanta, Georgia

10/__/2007
A Data-oriented (and Beyond) Network Architecture

T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K.H. Kim, S. Shenker, and I. Stoica

Computer Communication Review, Vol. 37, Issue 4, ACM, pp. 181-192

10/__/2007
Issues and Etiquette Concerning Use of Shared Measurement Data

M. Allman and V. Paxson

Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 135-140

10/__/2007
A Brief History of Scanning

M. Allman, V. Paxson, and J. Terrell

Proceedings of ACM SIGCOMM Conference on Internet Measurement, San Diego, California, pp. 77-82

10/__/2007
Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention

J. Gonzalez, V. Paxson, and N. Weaver

Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 139-149

10/__/2007
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

J. Franklin, V. Paxson, A. Perrig, and S. Savage

Proceedings of ACM Computer and Communication Security Conference (ACM CCS), Alexandria, Virginia, pp. 375-388

09/__/2007
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney

Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Queensland, Australia

08/__/2007
Resolving Inter-domain Policy Disputes

C.T. Ee, V. Ramachandran, B.-G. Chun, K. Lakshminarayanan, and S. Shenker

Proceedings of Conference on Applications, Technologies, Architechtures, and Procols for Computer Communications (SIGCOMM 2007), ACM, pp. 157-168, Kyoto, Japan

08/__/2007
Specifying New Congestion Control Algorithms

S. Floyd and M. Allman

Request For Comments 5033, Best Current Practice 133

08/__/2007
Hidden-Action in Network Routing

M. Feldman, J. Chuang, I. Stoica, and S. Shenker

IEEE Journal on Selected Areas in Communications, Vol. 25, Issue 6, IEEE Computer Society, pp. 1161-1172

08/__/2007
Ethane: Taking Control of the Enterprise

M. Casado, M. Freedman, J. Pettit, N. McKeown, and S. Shenker

SIGCOMM 2007

08/__/2007
Achieving Convergence-Free Routing using Failure-Carrying Packets

K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker, and I. Stoica

SIGCOMM 2007

08/__/2007
The Strengths of Weaker Identities: Opportunistic Personas

M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver

Proceedings of USENIX Workshop on Hot Topics in Security (HotSec ’07), Boston, Massachusetts

08/__/2007
Stress Testing Cluster Bro

N. Weaver and R. Sommer

Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test, Boston, Massachusetts

07/__/2007
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms

J. Jung, R. Milito, and V. Paxson

Proceedings of the 4th GI International Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA), Lucerne, Switzerland, pp. 175-192. Also Journal on Computer Virology, Vol. 4, Number 1, pp. 197-210, February 2008

05/__/2007
Determining an Appropriate Sending Rate Over an Underutilized Network Path

P. Sarolahti, M. Allman, and S. Floyd

Computer Networks Special Issue on Protocols for Fast, Long-Distance Networks, 51(7), May 2007

05/__/2007
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention

V. Paxson, R. Sommer, and N. Weaver

Proceedings of IEEE Sarnoff Symposium, pp. 1-7, Princeton, New Jersey

04/__/2007
X-trace: A Pervasive Network Tracing Framework

R. Fonseca, G. Porter, R.H. Katz, S. Shenker, and I. Stoica

Proceedings of Sumposium on Networked Systems Design and Implementation (NDSI 2007), USENIX/ACM , pp. 271-284, Cambridge, Mass.

04/__/2007
RFC 4828: TCP Friendly Rate Control (TFRC): the Small-Packet (SP) Variant

S. Floyd and E. Kohler

RFC 4828, Experimental, April 2007

04/__/2007
A Declarative Sensornet Architecture

A. Tavakoli, D. Chu, J. Hellerstein, P. Levis, and S. Shenker

in ACM SIGBED Review, Special Edition on International Workshop on Wiresless Sensor Network Architechture (WWSNA 2007), Vol. 4, Issue 3, pp. 55-60, Cambridge, Mass.

02/__/2007
The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention

N. Weaver, V. Paxson, and J.M. Gonzalez

Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA), Monterey, California, pp. 199-206

02/__/2007
Congestion Control Without a Startup Phase

D. Liu, M. Allman, S. Jin, and L. Wang

To appear in Proceedings of Protocols for Fast, Long Distance Networks Workshop

01/__/2007
RFC 4782 Quick-Start for TCP and IP

S. Floyd, M. Allman, A. Jain, and P. Sarolahti

Request For Comments 4782

__/__/2006
End-host Controlled Multicast Routing

K. Lakshminarayanan, A. Rao, I. Stoica, and S. Shenker

Elsevier Computer Networks, Special Issue on Overlay Distribution Structures and their Applications.

__/__/2006
The Design and Implementation of a Declarative Sensor Network System

D. Chu, L. Popa, A. Tavakoli, J. Hellerstein, P. Levis, S. Shenker, and I. Stoica

Technical Report EECS-2006-132, EECS Department, University of California, Berkeley

__/__/2006
Service Portability

S. Singh, S. Shenker, and G. Varghese

Proceedings of Hotnets 2006