메뉴 건너뛰기




Volumn 50, Issue 6, 2006, Pages 763-780

Understanding when location-hiding using overlay networks is feasible

Author keywords

Correlated vulnerabilities; Location hiding; Overlay network; Penetration attack; Proxy network; Security

Indexed keywords

CORRELATED VULNERABILITIES; LOCATION-HIDING; OVERLAY NETWORKS; PENETRATION ATTACK; PROXY NETWORKS;

EID: 32544431722     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.07.022     Document Type: Article
Times cited : (3)

References (24)
  • 2
    • 33751110528 scopus 로고    scopus 로고
    • Taming IP packet flooding attacks
    • D. Adkins et al., Taming IP packet flooding attacks, in: HotNets-II, 2003.
    • (2003) HotNets-II
    • Adkins, D.1
  • 8
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W.A. Arbaugh, W.L. Fithen, and J. McHugh Windows of vulnerability: a case study analysis IEEE Comput. 33 2000 52 59
    • (2000) IEEE Comput. , vol.33 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 10
    • 0004611826 scopus 로고
    • Predicting software reliability
    • B. Littlewood Predicting software reliability Phil. Trans. R. Soc. 327 1989 513 527
    • (1989) Phil. Trans. R. Soc. , vol.327 , pp. 513-527
    • Littlewood, B.1
  • 11
    • 0021199968 scopus 로고
    • Optimizing preventive service of software products
    • E.N. Adams Optimizing preventive service of software products IBM J. Res. Develop. 28 1 1984 2 14
    • (1984) IBM J. Res. Develop. , vol.28 , Issue.1 , pp. 2-14
    • Adams, E.N.1
  • 12
    • 84858546110 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft, Microsoft Security Bulletin, 2004, Microsoft Corporation, Available from: .
    • (2004) Microsoft Security Bulletin
  • 15
    • 84863168814 scopus 로고    scopus 로고
    • Empirical study of tolerating Denial-of-Service attacks with a proxy network
    • J. Wang, X. Liu, A.A. Chien, Empirical study of tolerating Denial-of-Service attacks with a proxy network, in: USENIX Security Symposium'05, 2005.
    • (2005) USENIX Security Symposium'05
    • Wang, J.1    Liu, X.2    Chien, A.A.3
  • 20
    • 32544444400 scopus 로고    scopus 로고
    • Coordinated Science Laboratory, Department of Electrical and Computer Engineering, University of Illinois, Urbana-Champaign
    • D.M. Nicol, M. Liljenstam, Models of Internet worm defense, Coordinated Science Laboratory, Department of Electrical and Computer Engineering, University of Illinois, Urbana-Champaign, 2004.
    • (2004) Models of Internet Worm Defense
    • Nicol, D.M.1    Liljenstam, M.2
  • 21
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D.L. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 2 1981 84 90
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.