Peter Reiher

ORCID: 0000-0002-5301-2246
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance
  • Advanced Malware Detection Techniques
  • Advanced Data Storage Technologies
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Distributed and Parallel Computing Systems
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Service-Oriented Architecture and Web Services
  • Parallel Computing and Optimization Techniques
  • Simulation Techniques and Applications
  • Access Control and Trust
  • Context-Aware Activity Recognition Systems
  • Software System Performance and Reliability
  • Vehicular Ad Hoc Networks (VANETs)
  • Mobile Agent-Based Network Management
  • Information and Cyber Security
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Green IT and Sustainability
  • Network Packet Processing and Optimization
  • Security and Verification in Computing

University of California, Los Angeles
2013-2024

UCLA Health
2002-2024

Laboratoire d'Informatique de Paris-Nord
2008

Institute of Electrical and Electronics Engineers
2005

University of California System
1987-2003

Jet Propulsion Laboratory
1989-2002

Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks defense approaches overwhelming. This paper presents two taxonomies for classifying defenses, thus provides researchers with better understanding problem current solution space. attack classification criteria was selected to highlight commonalities important features strategies, that define challenges dictate design countermeasures. taxonomy classifies body existing DDoS defenses...

10.1145/997150.997156 article EN ACM SIGCOMM Computer Communication Review 2004-04-01

Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects and stops originating from these networks. Attacks are detected by the constant monitoring of two-way traffic flows between network rest Internet periodic comparison with normal flow models. Mismatching rate-limited in proportion to their aggressiveness. D-WARD offers good service legitimate even during attack, while...

10.1109/icnp.2002.1181418 article EN 2003-08-27

The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the depends to a great extent on how well TCP works. Performance characteristics particular version are defined by congestion control algorithm it employs. This paper presents survey various proposals that preserve original host-to-host idea TCP-namely, neither sender nor receiver relies any explicit notification from network. proposed solutions focus variety problems, starting with basic problem...

10.1109/surv.2010.042710.00114 article EN IEEE Communications Surveys & Tutorials 2010-01-01

We describe a new approach to power saving and battery life extension on an untethered laptop through wireless remote processing of power-costly tasks. ran series experiments comparing the consumption processes run locally with that same remotely. examined trade-off between communication expenditures cost local processing. This paper describes our methodology results experiments. suggest ways further improve this approach, outline software design support process execution.

10.1145/584007.584008 article EN ACM SIGMOBILE Mobile Computing and Communications Review 1998-01-01

Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and problem debugging. However, due asymmetries in today's Internet routing, routers do not have readily available information verify the correctness of address for each incoming packet. In this paper we describe a new protocol, named SAVE, that provide with needed validation. SAVE messages propagate valid from location destinations, allowing router along way build an table associates...

10.1109/infcom.2002.1019407 article EN 2003-06-25

Defenses against flooding distributed denial-of-service (DDoS) commonly respond to the attack by dropping excess traffic, thus reducing overload at victim. The major challenge is differentiation of legitimate from so that policies can be selectively applied. We propose D-WARD, a source-end DDoS defense system achieves autonomous detection and surgically accurate response, thanks its novel traffic profiling techniques, adaptive response deployment. Moderate volumes seen near sources, even...

10.1109/tdsc.2005.35 article EN IEEE Transactions on Dependable and Secure Computing 2005-03-01

Reducing power consumption for server-class computers is important, since increased energy usage causes more heat dissipation, greater cooling requirements, reduced computational density, and higher operating costs. For a typical data center, storage accounts 27% of consumption. Conventional RAIDs cannot easily reduce because loads are balanced to use all disks, even light loads. We have built the power-aware RAID (PARAID), which reduces commodity disks without specialized hardware. PARAID...

10.1145/1288783.1289721 article EN ACM Transactions on Storage 2007-10-01

One approach to detecting insider misbehavior is monitor system call activity and watch for danger signs or unusual behavior. We describe an experimental designed test this approach. tested the system's ability detect common by examining file process-related calls. Our results show that can many such activities.

10.1109/smcsia.2003.1232400 article EN 2004-02-03

Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A nature DDoS suggests that mechanism is necessary successful defense. Three main defense functionalities -- attack detection, rate limiting and traffic differentiation are most effective when performed at victim-end, core sourceend respectively. Many existing systems in one aspect defense, but none offers comprehensive solution has seen wide deployment. We propose...

10.1109/acsac.2006.5 article EN Annual Computer Security Applications Conference/Proceedings of the annual Computer Security Applications Conference 2006-12-01

This research proposes and tests an approach to engineering distributed file systems that are aimed at wide-scale, Internet-based use. The premise is replication essential deliver performance availability, yet the traditional conservative replica consistency algorithms do not scale this environment. Our Ficus replicated system uses a single-copy optimistic update policy with reconciliation reliably detect concurrent updates automatically restore of directory replicas. peer-to-peer model in...

10.1002/(sici)1097-024x(199802)28:2<155::aid-spe155>3.0.co;2-5 article EN Software Practice and Experience 1998-02-01

Article Free Access Share on The remote processing framework for portable computer power saving Authors: Alexey Rudenko University of California, Los Angeles AngelesView Profile , Peter Reiher Gerald J. Popek PLATINUM technology Inc. Inc.View Geoffrey H. Kuenning Computer Science Department, Harvey Mudd College CollegeView Authors Info & Claims SAC '99: Proceedings the 1999 ACM symposium Applied computingFebruary Pages 365–372https://doi.org/10.1145/298151.298385Online:28 February...

10.1145/298151.298385 article EN 1999-02-28

Currently, there is no effective defense against large-scale distributed denial-of-service (DDoS) attacks. While numerous DDoS systems exist that offer excellent protection from specific attack types and scenarios, they can frequently be defeated by an attacker aware of their weaknesses. A necessary requirement for successful wide deployment, but none these guarantee deployment simply because depends more on market social aspects than the technical performance system.To successfully handle...

10.1145/986655.986658 article EN 2003-08-13

Optimistic systems execute events out of order and must undo their errors to produce correct results. Undoing incorrect work can be expensive. By restraining optimism, such might fewer thereby run faster. This paper examines two methods tested in the Time Warp Operating System. The first method explicitly prevents from executing far simulation future. second tries identify objects that are doing has undone; allowed less often. Experimental results show only modest gains were realized, even...

10.1145/76738.76834 article EN 1989-01-01

Researchers in the denial-of-service (DoS) field lack accurate, quantitative, and versatile metrics to measure service denial simulation testbed experiments. Without such metrics, it is impossible severity of various attacks, quantify success proposed defenses, compare their performance. Existing DoS equate with slow communication, low throughput, high resource utilization, loss rate. These are not because they fail monitor all traffic parameters that signal degradation. They quantitative...

10.1109/tdsc.2008.73 article EN IEEE Transactions on Dependable and Secure Computing 2008-12-04

The increasing popularity and acceptance of VANETs will make the deployment autonomous vehicles easier faster since VANET reduce dependence on expensive sensors.However, these benefits are counterbalanced by possible security attacks.We demonstrate a VANET-based botnet attack in an vehicle scenario that can cause serious congestion targeting hot spot road segments.We show via simulation increase trip times cars targeted area orders magnitude.After 5 minutes, becomes completely unusable.More...

10.14722/sent.2015.23001 article EN 2015-01-01

10.1023/a:1011862121702 article EN Mobile Networks and Applications 2001-01-01

Most network applications provide poor service when the network's capabilities are below a minimum level assumed by developer. As wider array of technologies become available, users will be increasingly frustrated with lack flexibility in such applications. The services provided an application should tunable to appropriate for and associated costs underlying network. Other researchers have shown that proxy agents can tailor communication pattern characteristics Dynamic deployment multiple...

10.1109/hotos.1999.798376 article EN 2003-01-20

Modern file systems assume the use of disk, a system-wide performance bottleneck for over decade. Current disk caching and RAM either impose high overhead to access memory content or fail provide mechanisms achieve data persistence across reboots.The Conquest system is based on observation that becoming inexpensive, which enables all services be delivered from memory, except providing large storage capacity. Unlike caching, uses with battery backup as persistent storage, provides specialized...

10.1145/1168910.1168914 article EN ACM Transactions on Storage 2006-08-01
Coming Soon ...