메뉴 건너뛰기




Volumn , Issue , 2005, Pages 538-547

Fatih: Detecting and isolating malicious routers

Author keywords

[No Author keywords available]

Indexed keywords

DATA TRANSPORT; DENIAL-OF-SERVICE; MALICIOUS ROUTERS; NETWORK ROUTERS;

EID: 27544472999     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2005.49     Document Type: Conference Paper
Times cited : (45)

References (47)
  • 8
    • 0014814325 scopus 로고    scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July '70
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Comm. of the ACM, 13(7):422-426, July '70.
    • Comm. of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 10
    • 0030102105 scopus 로고    scopus 로고
    • Unreliable failure detectors for reliable distributed systems
    • T. D. Chandra and S. Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225-267, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.2 , pp. 225-267
    • Chandra, T.D.1    Toueg, S.2
  • 11
    • 0022020346 scopus 로고
    • Distributed snapshots: Determining global states of distributed systems
    • K. M. Chandy and L. Lamport. Distributed snapshots: determining global states of distributed systems. ACM Transactions on Computer Systems, 3(1):63-75, 1985.
    • (1985) ACM Transactions on Computer Systems , vol.3 , Issue.1 , pp. 63-75
    • Chandy, K.M.1    Lamport, L.2
  • 12
    • 0031383687 scopus 로고    scopus 로고
    • An efficient message authentication scheme for link state routing
    • S. Cheung. An efficient message authentication scheme for link state routing. In ACSAC, pages 90-98, 1997.
    • (1997) ACSAC , pp. 90-98
    • Cheung, S.1
  • 13
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • S. Cheung and K. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop, 1997.
    • (1997) New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.2
  • 16
    • 0033650827 scopus 로고    scopus 로고
    • Trajectory sampling for direct traffic observation
    • N. G. Duffield and M. Grossglauser. Trajectory sampling for direct traffic observation. In SIGCOMM'00, pages 271-282.
    • SIGCOMM'00 , pp. 271-282
    • Duffield, N.G.1    Grossglauser, M.2
  • 17
    • 0142213065 scopus 로고    scopus 로고
    • Security: Adding protection to the network via the network processor
    • Aug.
    • W. Feghali, B. Burres, G. Wolrich, and D. Carrigan. Security: Adding protection to the network via the network processor. Intel Technology Journal, 06:40-49, Aug. 2002.
    • (2002) Intel Technology Journal , vol.6 , pp. 40-49
    • Feghali, W.1    Burres, B.2    Wolrich, G.3    Carrigan, D.4
  • 20
    • 0034848036 scopus 로고    scopus 로고
    • Early detection of message forwarding faults
    • A. Herzberg and S. Kutten. Early detection of message forwarding faults. SIAM J. Comput., 30(4): 1169-1196, 2000.
    • (2000) SIAM J. Comput. , vol.30 , Issue.4 , pp. 1169-1196
    • Herzberg, A.1    Kutten, S.2
  • 21
    • 0003976889 scopus 로고    scopus 로고
    • Trends in denial of service attack technology
    • CERT Coordination Center, Oct.
    • K. J. Houle, G. M. Weaver, N. Long, and R. Thomas. Trends in denial of service attack technology. Technical report, CERT Coordination Center, Oct. 2001.
    • (2001) Technical Report
    • Houle, K.J.1    Weaver, G.M.2    Long, N.3    Thomas, R.4
  • 23
    • 0033702951 scopus 로고    scopus 로고
    • Using conservation of flow as a security mechanism in network protocols
    • J. R. Hughes, T. Aura, and M. Bishop. Using conservation of flow as a security mechanism in network protocols. In IEEE Symp. on Security and Privacy, pages 132-131, 2000.
    • (2000) IEEE Symp. on Security and Privacy , pp. 132-1131
    • Hughes, J.R.1    Aura, T.2    Bishop, M.3
  • 24
    • 84962306569 scopus 로고    scopus 로고
    • Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
    • Y. Jou, F. Gong, C. Sargor, X. Wu, S. Wu, H. Chang, and F. Wang. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In DISCEX'00 Proceedings, volume 2, pages 69-83, 2000.
    • (2000) DISCEX'00 Proceedings , vol.2 , pp. 69-83
    • Jou, Y.1    Gong, F.2    Sargor, C.3    Wu, X.4    Wu, S.5    Chang, H.6    Wang, F.7
  • 27
    • 0141440838 scopus 로고    scopus 로고
    • Shining light on dark address space
    • Arbor Networks, Nov.
    • C. Labovitz, A. Ahuja, and M. Bailey. Shining light on dark address space. Technical report. Arbor Networks, Nov. 2001.
    • (2001) Technical Report
    • Labovitz, C.1    Ahuja, A.2    Bailey, M.3
  • 32
    • 0003499459 scopus 로고
    • Multicast extensions to OSPF
    • Mar.
    • J. T. Moy. Multicast extensions to OSPF. RFC 1584, IETF, Mar. 1994.
    • (1994) RFC 1584, IETF
    • Moy, J.T.1
  • 33
    • 34248682000 scopus 로고    scopus 로고
    • Data encryption standard
    • Oct.
    • National Institute of Standards and Technology. Data encryption standard. FIPS PUBS 46-3, Oct. 1999.
    • (1999) FIPS PUBS , vol.46 , Issue.3
  • 34
    • 84965066515 scopus 로고    scopus 로고
    • Advanced encryption standard
    • Nov.
    • National Institute of Standards and Technology. Advanced encryption standard. FIPS PUBS 197, Nov. 2001.
    • (2001) FIPS PUBS , vol.197
  • 35
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V. N. Padmanabhan and D. Simon. Secure traceroute to detect faulty or malicious routing. SIGCOMM Comp. Comm. Review, 33(1):77-82, 2003.
    • (2003) SIGCOMM Comp. Comm. Review , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.N.1    Simon, D.2
  • 40
    • 0003703503 scopus 로고    scopus 로고
    • Master's thesis, University of California, Berkeley, September
    • N. Shah. Understanding network processors. Master's thesis, University of California, Berkeley, September 2001.
    • (2001) Understanding Network Processors
    • Shah, N.1
  • 41
    • 0036947484 scopus 로고    scopus 로고
    • Beyond folklore: Observations on fragmented traffic
    • C. Shannon, D. Moore, and K. C. Claffy. Beyond folklore: observations on fragmented traffic. IEEE/ACM Trans. Netw., 10(6):709-720, 2002.
    • (2002) IEEE/ACM Trans. Netw. , vol.10 , Issue.6 , pp. 709-720
    • Shannon, C.1    Moore, D.2    Claffy, K.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.