메뉴 건너뛰기




Volumn 34, Issue 1, 2004, Pages 45-50

Taming IP packet flooding attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 24744468900     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/972374.972383     Document Type: Conference Paper
Times cited : (34)

References (25)
  • 1
    • 25744465894 scopus 로고    scopus 로고
    • Towards a more functional and secure network infrastructure
    • DC Berkeley
    • D. Adkins, K. Lakshminarayanan, A. Perrig, and I. Stoica. Towards a more functional and secure network infrastructure. Technical Report CSD-03-1242, DC Berkeley, 2003.
    • (2003) Technical Report , vol.CSD-03-1242
    • Adkins, D.1    Lakshminarayanan, K.2    Perrig, A.3    Stoica, I.4
  • 2
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for Internet services
    • Seattle, WA
    • D. G. Andersen. Mayday: Distributed filtering for Internet services. In USITS, Seattle, WA, 2003.
    • (2003) USITS
    • Andersen, D.G.1
  • 3
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial-of-service with capabilities
    • Cambridge, MA, Nov.
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In Proc. of Hotnets-II, Cambridge, MA, Nov. 2003.
    • (2003) Proc. of Hotnets-II
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 4
    • 0037517134 scopus 로고    scopus 로고
    • DoS-resistant authentication with client puzzles
    • Lecture Notes in Computer Science, Cambridge, United Kingdom, Apr. Springer-Verlag
    • T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In Security Protocols - 8th International Workshop, Lecture Notes in Computer Science, Cambridge, United Kingdom, Apr. 2000. Springer-Verlag.
    • (2000) Security Protocols - 8th International Workshop
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 5
    • 0000615530 scopus 로고    scopus 로고
    • An integrated congestion management architecture for Internet hosts
    • Cambridge, MA, Sept.
    • H. Balakrishnan, H. Rahul, and S. Seshan. An integrated congestion management architecture for Internet hosts. In Proc. of ACM SIGCOMM '99, Cambridge, MA, Sept. 1999.
    • (1999) Proc. of ACM SIGCOMM '99
    • Balakrishnan, H.1    Rahul, H.2    Seshan, S.3
  • 6
    • 2542523334 scopus 로고    scopus 로고
    • ICMP traceback messages
    • Work in progress, February
    • S. Bellovin, M. Leech, and T. Taylor. ICMP traceback messages, Internet draft, Work in progress, February 2003.
    • (2003) Internet Draft
    • Bellovin, S.1    Leech, M.2    Taylor, T.3
  • 10
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • E. Brickell, editor, Advances in Cryptology - CRYPTO '92. International Association for Cryptologic Research, Springer-Verlag
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 139-147. International Association for Cryptologic Research, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 13
    • 1242265018 scopus 로고    scopus 로고
    • Persistent dropping: An efficient control of traffic aggregates
    • Karlsruhe, Germany, Aug.
    • H. Jamjoom and K. G. Shin. Persistent dropping: An efficient control of traffic aggregates. In Proc. of ACM SIGCOMM '03, pages 287-297, Karlsruhe, Germany, Aug. 2003.
    • (2003) Proc. of ACM SIGCOMM '03 , pp. 287-297
    • Jamjoom, H.1    Shin, K.G.2
  • 14
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. of the Symposium on NDSS, 1999.
    • (1999) Proc. of the Symposium on NDSS
    • Juels, A.1    Brainard, J.2
  • 17
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • Apr.
    • R. Merkle. Secure communication over insecure channels. Commun. ACM, 21(4):294-299, Apr. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 21
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig. Advanced and Authenticated Marking Schemes for IP Traceback. In Proc of IEEE INFOCOM, 2001.
    • (2001) Proc of IEEE INFOCOM
    • Song, D.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.