메뉴 건너뛰기




Volumn 31, Issue 4, 2001, Pages 15-26

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DATA COMMUNICATION SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK PROTOCOLS; PACKET NETWORKS; QUALITY OF SERVICE; SECURITY OF DATA;

EID: 0034776786     PISSN: 01464833     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/964723.383061     Document Type: Conference Paper
Times cited : (318)

References (31)
  • 2
    • 0004194675 scopus 로고    scopus 로고
    • ICMP traceback messages
    • Mar.; Internet Draft: draft-bellovin-itrace-00.txt (expires September 2000)
    • (2000)
    • Bellovin, S.1
  • 4
    • 0002915461 scopus 로고    scopus 로고
    • CERT Advisory CA-2000-01 Denial-of-service developments, Jan.
    • (2000)
  • 5
    • 84867255072 scopus 로고    scopus 로고
    • Consensus roadmap for defeating distributed denial of service attacks
    • CERT/CC, S. Institute, and CERIAS; Feb.; A Project of the Partnership for Critical Infrastructure Security
    • (2000)
  • 7
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • May; RFC 2827
    • (2000)
    • Ferguson, P.1    Senie, D.2
  • 8
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Apr.
    • (2000) Computer , pp. 12-17
    • Garber, L.1
  • 11
    • 0003531721 scopus 로고    scopus 로고
    • An analysis of security incidents on the internet
    • PhD thesis, Carnegie Mellon University, Aug.
    • (1998)
    • Howard, J.1
  • 12
    • 0003726345 scopus 로고    scopus 로고
    • Inet: Internet topology generator
    • Technical Report CSE-TR-443-00, Department of EECS, University of Michigan
    • (2000)
    • Jin, C.1    Chen, Q.2    Jamin, S.3
  • 14
    • 0003038733 scopus 로고    scopus 로고
    • Brite: A flexible generator of internet topologies
    • Technical Report BU-CS-TR-2000-005, Boston University, Jan.
    • (2000)
    • Medina, A.1    Matta, I.2
  • 15
    • 0003804730 scopus 로고
    • A weakness in the 4.2BSD unix TCP/IP software
    • Technical Report Computer Science 117, AT&T Bell Labs, Feb.
    • (1985)
    • Morris, R.1
  • 17
    • 0002913380 scopus 로고    scopus 로고
    • Purgatory 101: Learning to cope with the SYNs of the internet
    • Some practical approaches to introducing accountability and responsibility on the public internet
    • (2000)
    • Axis, N.1    Puppy, R.F.2
  • 21
    • 0004292408 scopus 로고
    • Internet protocol
    • Sept.; RFC 791
    • (1981)
    • Postel, J.1
  • 22
    • 0003700411 scopus 로고    scopus 로고
    • Security fun with OCxmon and cflowd
    • Nov.; Presentation at the Internet 2 Working Group
    • (1998)
    • Sager, G.1
  • 25
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Technical Report UCB/CSD-00-1107, Computer Science Department, University of California, Berkeley
    • (2000) IEEE INFOCOM 2001
    • Song, D.1    Perrig, A.2
  • 27
    • 3042843099 scopus 로고    scopus 로고
    • Characterizing and tracing packet floods using Cisco routers
    • Aug.
    • (1999)
    • Systems, C.1
  • 28
    • 4243312707 scopus 로고    scopus 로고
    • Denial of service
    • Feb.; Tech Tips; 2nd revision
    • (1999)
    • Team, C.E.R.1
  • 29
    • 0011244671 scopus 로고    scopus 로고
    • Results of the distributed-systems intruder tools workshop
    • Nov.
    • (1999)
    • Team, C.E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.