메뉴 건너뛰기




Volumn 176, Issue 2, 2007, Pages 1283-1292

A packet filter placement problem with application to defense against spoofed denial of service attacks

Author keywords

Combinatorial optimization; Internet; Route based packet filtering; Spoofed denial of service attack; Vertex cover

Indexed keywords

COMBINATORIAL OPTIMIZATION; ROUTE BASED PACKET FILTERING; SPOOFED DENIAL OF SERVICE ATTACK; VERTEX COVER;

EID: 33749539695     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2005.09.031     Document Type: Article
Times cited : (18)

References (18)
  • 1
    • 33749575547 scopus 로고    scopus 로고
    • S. Axelsson, Research in intrusion detection systems: A survey, Tech. Rep. TR 98-17, Chalmers University of Technology, 1999.
  • 2
    • 0002590071 scopus 로고
    • Set covering algorithms using cutting planes, heuristics, and subgradient optimization
    • Balas E., and Ho A.C. Set covering algorithms using cutting planes, heuristics, and subgradient optimization. Mathematical Programming Study 12 (1980) 37-60
    • (1980) Mathematical Programming Study , vol.12 , pp. 37-60
    • Balas, E.1    Ho, A.C.2
  • 3
    • 33749559650 scopus 로고    scopus 로고
    • Computer Emergency Response Team (CERT), Advisory CA-2000-01 Denial-of-service developments, 2000. Available from: .
  • 4
    • 33749567377 scopus 로고    scopus 로고
    • CERT/CC, SANS Institute, and CERIAS, Consensus roadmap for defeating distributed denial of service attacks, 2000. Available from: .
  • 6
    • 84974862896 scopus 로고
    • Solution of set-covering and set-partitioning problem using assignment relaxations
    • El-Darzi E., and Mitra G. Solution of set-covering and set-partitioning problem using assignment relaxations. Journal of the Operational Research Society 5 (1992) 483-493
    • (1992) Journal of the Operational Research Society , vol.5 , pp. 483-493
    • El-Darzi, E.1    Mitra, G.2
  • 7
    • 0033204106 scopus 로고    scopus 로고
    • M. Faloutsos, P. Faloutsos, C. Faloutsos, On power-law relationships of the Internet topology, in: Proc. ACM SIGCOMM, 1999, pp. 251-262.
  • 8
    • 33749545519 scopus 로고    scopus 로고
    • P. Ferguson, D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, RFC 2827, 2000.
  • 9
    • 0000554525 scopus 로고
    • Optimal solution of set covering/partitioning problems using dual heuristics
    • Fisher M.L., and Kedia P. Optimal solution of set covering/partitioning problems using dual heuristics. Management Science 36 (1990) 674-688
    • (1990) Management Science , vol.36 , pp. 674-688
    • Fisher, M.L.1    Kedia, P.2
  • 10
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • Garber L. Denial-of-service attacks rip the Internet. Computer 33 4 (2000) 12-17
    • (2000) Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 13
    • 0000253416 scopus 로고
    • Approximation algorithms for the set covering and vertex cover problems
    • Hochbaum D.S. Approximation algorithms for the set covering and vertex cover problems. SIAM Journal on Computing 11 3 (1982) 555-556
    • (1982) SIAM Journal on Computing , vol.11 , Issue.3 , pp. 555-556
    • Hochbaum, D.S.1
  • 14
    • 0037118770 scopus 로고    scopus 로고
    • Solving integer programs over monotone inequalities in three variables: A framework for half integrality and good approximations
    • Hochbaum D.S. Solving integer programs over monotone inequalities in three variables: A framework for half integrality and good approximations. European Journal of Operational Research 140 2 (2002) 291-321
    • (2002) European Journal of Operational Research , vol.140 , Issue.2 , pp. 291-321
    • Hochbaum, D.S.1
  • 15
    • 0035010963 scopus 로고    scopus 로고
    • K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proc. IEEE INFOCOM, 2001, pp. 338-347.
  • 16
    • 0034776786 scopus 로고    scopus 로고
    • K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proc. ACM SIGCOMM, 2001, pp. 15-26.
  • 17
    • 0033650584 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proc. of ACM SIGCOMM, 2000, pp. 295-306.
  • 18
    • 0034838197 scopus 로고    scopus 로고
    • M. Schultz, E. Eskin, E. Zadok, S. Stolfo, Data mining methods for detection of new malicious executables, in: Proc. IEEE Symposium on Security and Privacy, 2001, pp. 178-184.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.