Stealthy Spreader Detection: Detecting stealthy spreaders, the presence of a sufficiently
large number of hosts that connect to more than a certain
number of unique destinations within a given time window, over
high-speed networks.
Error Message based DoS Attack on wireless networks: Triggering or directly sending error messages may disrupt many protocols and we found this also happen in some important authentication protocols. With two case studies of real experiments, we demonstrate the practicality and power of this attack. The two vulnerable protocols are: 1) TLS based EAP protocols including PEAP, EAP-TLS and EAP-FAST; 2) IEEE 802.16 Return Routability protocol.