메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 104-121

Mitigating network denial-of-service through diversity-based traffic management

Author keywords

Diversity; Flash worms; Network denial of service; Network security; Traffic shaping

Indexed keywords

BANDWIDTH; COMPUTER WORMS; CONGESTION CONTROL (COMMUNICATION); TELECOMMUNICATION TRAFFIC;

EID: 26444534457     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_8     Document Type: Conference Paper
Times cited : (16)

References (27)
  • 2
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the internet
    • Floyd, S., K.Fall: Promoting the Use of End-to-End Congestion Control in the Internet. IEEE/ACM Transactions on Networking 7 (1999) 458-472
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , pp. 458-472
    • Floyd, S.1    Fall, K.2
  • 3
    • 0035331281 scopus 로고    scopus 로고
    • A survey of TCP-friendly congestion control
    • Widmer, J., Denda, R., Mauve, M.: A Survey of TCP-Friendly Congestion Control. IEEE Network (2001)
    • (2001) IEEE Network
    • Widmer, J.1    Denda, R.2    Mauve, M.3
  • 4
    • 20744456691 scopus 로고    scopus 로고
    • A survey of congestion control schemes for multicast video applications
    • Matrawy, A., Lambadaris, I.: A Survey of Congestion Control Schemes for Multicast Video Applications. IEEE Communications Surveys and Tutorials 5 (2003) 22-31
    • (2003) IEEE Communications Surveys and Tutorials , vol.5 , pp. 22-31
    • Matrawy, A.1    Lambadaris, I.2
  • 6
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • Floyd, S., Jacobson, V.: Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM Trans. on Networking (1993) 397-413
    • (1993) IEEE/ACM Trans. on Networking , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 7
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: Focusing on elephants, ignoring the mice
    • Estan, C., Varghese, G.: New Directions in Traffic Measurement and Accounting: Focusing on Elephants, Ignoring the Mice. ACM Trans. on Computer Systems 21 (2003) 270-313
    • (2003) ACM Trans. on Computer Systems , vol.21 , pp. 270-313
    • Estan, C.1    Varghese, G.2
  • 8
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Germany
    • Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: Proceedings of ACM SIGCOMM'03, Germany (2003) 270-313
    • (2003) Proceedings of ACM SIGCOMM'03 , pp. 270-313
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 9
    • 0032141929 scopus 로고
    • Explicit allocation of best effort packet delivery service
    • Clark, D., Fangand, W.: Explicit Allocation of Best Effort Packet Delivery Service. IEEE/ACM Trans. on Networking 6 (1988) 362-373
    • (1988) IEEE/ACM Trans. on Networking , vol.6 , pp. 362-373
    • Clark, D.1    Fangand, W.2
  • 12
    • 0031355838 scopus 로고    scopus 로고
    • Traffic shaping at a network node: Theory, optimum design, admission control
    • Elwalid, A., Mitra, D.: Traffic Shaping at a Network Node: Theory, Optimum Design, Admission Control. In: Proceedings of IEEE InfoCom'97. (1997)
    • (1997) Proceedings of IEEE InfoCom'97
    • Elwalid, A.1    Mitra, D.2
  • 14
    • 0011134472 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • Ioannidis, J., Bellovin, S.: Implementing Pushback: Router-based Defense against DDoS Attacks. In: Proceedings of NDSS'02. (2001)
    • (2001) Proceedings of NDSS'02
    • Ioannidis, J.1    Bellovin, S.2
  • 20
    • 0003676885 scopus 로고
    • Fingerprinting by random polynomials
    • Harvard University
    • Rabin, M.: Fingerprinting by Random Polynomials. Technical report 15-81, Harvard University (1981)
    • (1981) Technical Report , vol.15 , Issue.81
    • Rabin, M.1
  • 21
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • Kreibich, C., Crowcroft, J.: Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. In: Proceedings of HOTNETS-II. (2003)
    • (2003) Proceedings of HOTNETS-II
    • Kreibich, C.1    Crowcroft, J.2
  • 23
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Proceedings of RAID'04. (2004)
    • (2004) Proceedings of RAID'04
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.