메뉴 건너뛰기




Volumn , Issue , 2004, Pages 354-362

A source identification scheme against DDoS attacks in cluster interconnects

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTER INTERCONNECTS; DETERMINISTIC DISTANCE PACKET MARKING (DDPM); DISTRIBUTED DENIAL OF SERVICES (DDOS); INTRUSION DETECTION SYSTEM (IDS));

EID: 10044259776     PISSN: 15302016     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPPW.2004.1328039     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 1
    • 84992267980 scopus 로고    scopus 로고
    • Internet watch: Mapping the Internet
    • Apr.
    • H. Burch and B. Cheswick, "Internet watch: Mapping the Internet," Computer, 32(4):97-98, Apr. 1999.
    • (1999) Computer , vol.32 , Issue.4 , pp. 97-98
    • Burch, H.1    Cheswick, B.2
  • 3
    • 10044275248 scopus 로고    scopus 로고
    • Caida. Skitter, http://www.caida.org/tools/measurement/-skitter/, 2000.
    • (2000)
  • 6
    • 0242456132 scopus 로고    scopus 로고
    • Breaking the barriers: High performance security for HighPerformance computing
    • Kay Connelly and Andrew A. Chien, "Breaking the Barriers: High Performance Security for HighPerformance Computing," in New Security Paradigms Workshop '02, 2000.
    • (2000) New Security Paradigms Workshop '02
    • Connelly, K.1    Chien, A.A.2
  • 10
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • Jan.
    • P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," Internet RFC 2267, Jan. 1998.
    • (1998) Internet RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 11
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attack rip the internet
    • April
    • L. Garber, "Denial-of-Service Attack Rip the Internet," Computer, April 2000.
    • (2000) Computer
    • Garber, L.1
  • 13
    • 0002493137 scopus 로고    scopus 로고
    • Managing security in high- Performance distributed computations
    • Foster Ian, Nicholas Karonis, Carl Kesselman and Steven Tuecke, "Managing Security in High- Performance Distributed Computations," Cluster Computing, Vol 1, issue 1, pages 95-107, 1998.
    • (1998) Cluster Computing , vol.1 , Issue.1 , pp. 95-107
    • Ian, F.1    Karonis, N.2    Kesselman, C.3    Tuecke, S.4
  • 14
    • 2442572423 scopus 로고    scopus 로고
    • Internet mapping, http://research.lumeta.com/ches/map/, 2002.
    • (2002) Internet Mapping
  • 15
  • 16
    • 0041534274 scopus 로고    scopus 로고
    • A snapshot of global internet worm activity
    • Arbor Networks, Nov.
    • D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Tech. Rep., Arbor Networks, Nov.2001.
    • (2001) Tech. Rep.
    • Song, D.1    Malan, R.2    Stone, R.3
  • 17
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Dawn X. Song and Adrian Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in Proceedings of INFOCOM 2001, 2001.
    • (2001) Proceedings of INFOCOM 2001
    • Song, D.X.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.