메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 1419-1422

A monitoring system for mitigating fast propagating worms in the network infrastructure

Author keywords

Denial of service; Flash crowds; Network security; Worms

Indexed keywords

BANDWIDTH; COMPUTER CRIME; MONITORING; PACKET NETWORKS; QUEUEING NETWORKS; ROUTERS;

EID: 33751313620     PISSN: 08407789     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCECE.2005.1557246     Document Type: Conference Paper
Times cited : (3)

References (29)
  • 1
    • 0034206002 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area Web cache sharing protocol
    • June
    • L. Fan, P. Cao, J. Almeida, and A.Z. Broder, "Summary cache: A scalable wide-area Web cache sharing protocol," IEEE/ACM Trans. on Networking, vol. 8, no. 3, pp. 281-293, June 2000.
    • (2000) IEEE/ACM Trans. on Networking , vol.8 , Issue.3 , pp. 281-293
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.Z.4
  • 3
    • 3543102829 scopus 로고    scopus 로고
    • Technical Report SSC/1998/037, EPFL, November [Accessed: February 12, 2004]
    • W. Almesberger, "Linux traffic control - implementation overview," Technical Report SSC/1998/037, EPFL, November 1998.URL: ftp://lroftp.epfl.ch/pub/people/_almesber/pub/tcio-current.ps.gz [Accessed: February 12, 2004].
    • (1998) Linux Traffic Control - Implementation Overview
    • Almesberger, W.1
  • 5
    • 0005933497 scopus 로고
    • On packet switches with infinite storage
    • J. Nagle, "On packet switches with infinite storage," IETF RFC 970, 1985.
    • (1985) IETF RFC , vol.970
    • Nagle, J.1
  • 6
    • 0023329886 scopus 로고
    • On packet switches with infinite storage
    • J. Nagle, "On packet switches with infinite storage," IEEE Trans. on Communications, vol. 35, pp. 435-438, 1987.
    • (1987) IEEE Trans. on Communications , vol.35 , pp. 435-438
    • Nagle, J.1
  • 8
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • S. Floyd and V. Jacobson, "Random early detection gateways for congestion avoidance," IEEE/ACM Trans. on Networking, vol. 1, no. 4, pp. 397-413, 1993.
    • (1993) IEEE/ACM Trans. on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 10
    • 0035699161 scopus 로고    scopus 로고
    • Using dynamic buffer limiting to protect against belligerent flows in high-speed networks
    • Riverside, USA, November 11-14
    • F. Ertemalp, D.R. Cheriton, and A. Bechtolsheim, "Using dynamic buffer limiting to protect against belligerent flows in high-speed networks," Int 7 Conf. on Network Protocols (ICNP), pages 230-240, Riverside, USA, November 11-14 2001.
    • (2001) Int 7 Conf. on Network Protocols (ICNP) , pp. 230-240
    • Ertemalp, F.1    Cheriton, D.R.2    Bechtolsheim, A.3
  • 11
    • 0038404196 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Miami Beach, USA, May
    • D.K.Y. Yau, J.C.S. Lui, and F. Liang, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," Proc. of the IEEE Int'l Workshop on Quality of Service, Miami Beach, USA, May 2002.
    • (2002) Proc. of the IEEE Int'l Workshop on Quality of Service
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3
  • 15
    • 0142039747 scopus 로고    scopus 로고
    • Transport-aware IP routers: A built-in protection mechanism to counter DDoS attacks
    • September
    • H. Wang and K.G. Shin, "Transport-aware IP routers: A built-in protection mechanism to counter DDoS attacks," IEEE Trans. on Parallel and Distributed Systems, vol. 14, no. 9, pp. 873-884, September 2003.
    • (2003) IEEE Trans. on Parallel and Distributed Systems , vol.14 , Issue.9 , pp. 873-884
    • Wang, H.1    Shin, K.G.2
  • 20
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B.H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Comm. of the ACM, vol. 13, no. 17, pp. 422-426 , July 1970.
    • (1970) Comm. of the ACM , vol.13 , Issue.17 , pp. 422-426
    • Bloom, B.H.1
  • 23
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • Report 2003/216, [Accessed: January 7, 2004]
    • E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, Report 2003/216, 2003. URL:http://eprint.iacr.org/2003/216 / [Accessed: January 7, 2004].
    • (2003) Cryptology EPrint Archive
    • Goh, E.-J.1
  • 24
    • 3543118019 scopus 로고    scopus 로고
    • Space-code Bloom filter for efficient traffic flow measurement
    • Miami Beach, USA, October 27-29
    • A. Kumar, J. Xu, L. Li, and J. Wang, "Space-code Bloom filter for efficient traffic flow measurement," Proc. of IMC, Miami Beach, USA, October 27-29 2003.
    • (2003) Proc. of IMC
    • Kumar, A.1    Xu, J.2    Li, L.3    Wang, J.4
  • 26
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • January
    • C. Nachenberg, "Computer virus-antivirus coevolution," Comm. of the ACM, 40(1):46-51, January 1997.
    • (1997) Comm. of the ACM , vol.40 , Issue.1 , pp. 46-51
    • Nachenberg, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.