메뉴 건너뛰기




Volumn , Issue , 2006, Pages 7-13

Efficient and secure source authentication with packet passports

Author keywords

[No Author keywords available]

Indexed keywords

COLLATERAL DAMAGE; CONTROL MESSAGES; DENIAL OF SERVICE; HIGH-SPEED ROUTERS; PACKET CONTENTS; PASSPORT SYSTEMS; PRELIMINARY ANALYSIS; SOURCE AUTHENTICATION;

EID: 38049148364     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (35)

References (33)
  • 1
    • 85093840697 scopus 로고    scopus 로고
    • UMAC implementation
    • UMAC implementation. http://www.cs.ucdavis.edu/∼rogaway/umac/.
  • 2
    • 85093843218 scopus 로고    scopus 로고
    • Caida report. February
    • Caida report. http://www.caida.org/analysis/AIX/plenhist/, February 2000.
    • (2000)
  • 3
    • 25844486083 scopus 로고    scopus 로고
    • Spoofing prevention method
    • B.-B. A. and L. H
    • B.-B. A. and L. H. Spoofing prevention method. In Proc. IEEE Infocom, 2005.
    • (2005) Proc. IEEE Infocom
  • 4
    • 85050149881 scopus 로고    scopus 로고
    • Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks
    • K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX 2005, 2005.
    • (2005) USENIX 2005
    • Argyraki, K.1    Cheriton, D.2
  • 5
    • 85093834625 scopus 로고    scopus 로고
    • DDoS attacks still pose threat to Internet
    • 11/4/03
    • DDoS attacks still pose threat to Internet. BizReport, 11/4/03.
    • BizReport
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity based encryption from the weil pairing. SIAM J. of Computing, 32(3):586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 85093855677 scopus 로고    scopus 로고
    • Extortion via DDoS on the rise
    • 5/16/05
    • Extortion via DDoS on the rise. Network World, 5/16/05.
    • Network World
  • 10
    • 0010057139 scopus 로고    scopus 로고
    • Analysis of the autonomous system network topology
    • July
    • D.Magoni and J.J.Pansiot. Analysis of the autonomous system network topology. Computer Communications Review, 31(3):26-37, July 2001.
    • (2001) Computer Communications Review , vol.31 , Issue.3 , pp. 26-37
    • Magoni, D.1    Pansiot, J.J.2
  • 13
    • 0003334329 scopus 로고    scopus 로고
    • Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing
    • P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing. Internet RFC 2827, 2000.
    • (2000) Internet RFC , vol.2827
    • Ferguson, P.1    Senie, D.2
  • 18
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. Internet RFC 2104, 1997.
    • (1997) Internet RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 19
    • 34748827677 scopus 로고    scopus 로고
    • UMAC: Message authentication code using universal hashing
    • T. Krovetz. UMAC: Message authentication code using universal hashing. Internet RFC 4418, 2006.
    • (2006) Internet RFC , vol.4418
    • Krovetz, T.1
  • 22
    • 85093824527 scopus 로고    scopus 로고
    • Three practical ways to improve your network
    • K. Miller. Three practical ways to improve your network. In Proc. of USENIX LISA, 2003.
    • (2003) Proc. of USENIX LISA
    • Miller, K.1
  • 24
    • 0001083965 scopus 로고    scopus 로고
    • On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
    • K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 25
    • 0030661010 scopus 로고    scopus 로고
    • Ticket based service access for the mobile user
    • B. Patel and J. Crowcroft. Ticket based service access for the mobile user. In Proceedings of MobiCom'97, pages 223-233, 1997.
    • (1997) Proceedings of MobiCom'97 , pp. 223-233
    • Patel, B.1    Crowcroft, J.2
  • 28
    • 0034997397 scopus 로고    scopus 로고
    • Advance and Authenticated Marking Schemes for IP Traceback
    • D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
    • (2001) Proc. IEEE Infocom
    • Song, D.1    Perrig, A.2
  • 32
    • 33749866400 scopus 로고    scopus 로고
    • A DoS-Limiting Network Architecture
    • Philadelphia, PA, Aug
    • X. Yang, D. Wetherall, and T. Anderson. A DoS-Limiting Network Architecture. In ACM SIGCOMM, Philadelphia, PA, Aug. 2005.
    • (2005) ACM SIGCOMM
    • Yang, X.1    Wetherall, D.2    Anderson, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.