FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks (CMU-CyLab-11-019)

作者: Virgil D. Gligor , Soo Bum Lee

DOI:

关键词: Computer securityBusinessComputer networkFlooding (computer networking)

摘要:

参考文章(25)
David Dagon, Cliff Changchun Zou, Wenke Lee, Modeling Botnet Propagation Using Time Zones. network and distributed system security symposium. ,(2006)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Bill Lin, Subhabrata Sen, Jerry Chou, Oliver Spatscheck, Proactive surge protection: a defense mechanism for bandwidth-based attacks usenix security symposium. pp. 123- 138 ,(2008)
Steven Michael Bellovin, John Ioannidis, Implementing Pushback : Router-Based Defense Against DDoS Attacks network and distributed system security symposium. ,(2002) , 10.7916/D8R78MXV
C. Partridge, A Proposed Flow Specification RFC. ,vol. 1363, pp. 1- 20 ,(1992)
Ahren Studer, Adrian Perrig, The Coremelt attack european symposium on research in computer security. pp. 37- 52 ,(2009) , 10.1007/978-3-642-04444-1_3
Nick McKeown, Isaac Keslassy, Guido Appenzeller, Sizing router buffers ,(2005)
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, On the impact of dynamic addressing on malware propagation Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 51- 56 ,(2006) , 10.1145/1179542.1179554
Xiaowei Yang, David Wetherall, Thomas Anderson, A DoS-limiting network architecture acm special interest group on data communication. ,vol. 35, pp. 241- 252 ,(2005) , 10.1145/1080091.1080120