메뉴 건너뛰기




Volumn , Issue , 2006, Pages 54-64

Internet cache pollution attacks and countermeasures

Author keywords

[No Author keywords available]

Indexed keywords

BLOOM FILTERING; CACHE POLLUTION; CACHE REPLACEMENT POLICIES; COMPUTATION TECHNIQUES; COUNTERMEASURES (CM); DENIAL OF SERVICE (DOS) ATTACKS; DETECTION ACCURACY; DISTRIBUTED ATTACKS; EFFICIENT METHODS; EVALUATION RESULTS; IN ORDER; INTERNATIONAL CONFERENCES; LARGE-SCALE SIMULATIONS; PEER-TO-PEER (P2P); PROXY CACHING;

EID: 46149091310     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2006.320198     Document Type: Conference Paper
Times cited : (37)

References (37)
  • 2
    • 46149095381 scopus 로고    scopus 로고
    • "Akamai," http://www.akamai.com/.
  • 3
    • 46149113105 scopus 로고    scopus 로고
    • CNET News.com, P2p caching: Unsafe at any speed? 2003, http://news.com.com/2100-1025.3-1027508.html.
    • CNET News.com, "P2p caching: Unsafe at any speed?" 2003, http://news.com.com/2100-1025.3-1027508.html.
  • 5
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Communications of ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 6
    • 0038742365 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, 'Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites," in ACM WWW, 2002.
    • (2002) ACM WWW
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 9
    • 46149101890 scopus 로고    scopus 로고
    • File swappers fight back,
    • BBC News, "File swappers fight back," 2003, http://news.bbc.co.uk/1/hi/technology/3013065.stm.
    • (2003) BBC News
  • 12
  • 15
    • 84863168814 scopus 로고    scopus 로고
    • Empirical study of tolerating denial-of-service attacks with a proxy network
    • J. Wang, X. Liu, and A. Chien, "Empirical study of tolerating denial-of-service attacks with a proxy network," in Usenix Security Symposium, 2005.
    • (2005) Usenix Security Symposium
    • Wang, J.1    Liu, X.2    Chien, A.3
  • 17
    • 33845584959 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area Web cache sharing protocol
    • L. Fan, P. Cao, J. Almeida, and A. Broder, "Summary cache: A scalable wide-area Web cache sharing protocol," in ACM SIGCOMM, 1998.
    • (1998) ACM SIGCOMM
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.4
  • 18
    • 0003228473 scopus 로고    scopus 로고
    • Not all hits are created equal: Cooperative proxy caching over a wide area network
    • M. Rabinovich, J. Chase, and S. Gadde, "Not all hits are created equal: Cooperative proxy caching over a wide area network," in WWW Caching Workshop, 1998.
    • (1998) WWW Caching Workshop
    • Rabinovich, M.1    Chase, J.2    Gadde, S.3
  • 19
    • 0042985661 scopus 로고    scopus 로고
    • The LSAM proxy cache - a multicast distributed virtual cache
    • J. Touch, "The LSAM proxy cache - a multicast distributed virtual cache," in WWW Caching Workshop, 1998.
    • (1998) WWW Caching Workshop
    • Touch, J.1
  • 23
    • 27144548990 scopus 로고    scopus 로고
    • An overview of Web caching replacement algorithms
    • A. Balamash and M. Krunz, "An overview of Web caching replacement algorithms," IEEE Communications Surveys & Tutorials, vol. 6, no. 2, pp. 44-56, 2004.
    • (2004) IEEE Communications Surveys & Tutorials , vol.6 , Issue.2 , pp. 44-56
    • Balamash, A.1    Krunz, M.2
  • 25
    • 84862441441 scopus 로고    scopus 로고
    • Evaluating content management techniques for web proxy caches
    • Online, Available
    • M. Arlitt, L. Cherkasova, J. Dilley, R. Friedrich, and T. Jin, "Evaluating content management techniques for web proxy caches," in HP Labs TR, 1999. [Online]. Available: http://www.hpl.hp.com/techreports/ 1999/HPL-1999-69.html
    • (1999) HP Labs TR
    • Arlitt, M.1    Cherkasova, L.2    Dilley, J.3    Friedrich, R.4    Jin, T.5
  • 26
    • 84862445067 scopus 로고    scopus 로고
    • Enhancement and validation of Squid's cache replacement policy
    • Online, Available
    • J. Dilley, M. Arlitt, and S. Perret, "Enhancement and validation of Squid's cache replacement policy," in HP Labs TR, 1999. [Online]. Available: http://www.hpl.hp.com/techreports/1999/HPL-1999-69.html
    • (1999) HP Labs TR
    • Dilley, J.1    Arlitt, M.2    Perret, S.3
  • 27
    • 0000683317 scopus 로고    scopus 로고
    • What TCP/IP protocol headers can tell us about the Web
    • F. Smith, F. Campos, K. Jeffay, and D. Ott, "What TCP/IP protocol headers can tell us about the Web," in ACM SIGMETRICS, 2001.
    • (2001) ACM SIGMETRICS
    • Smith, F.1    Campos, F.2    Jeffay, K.3    Ott, D.4
  • 30
    • 2442537008 scopus 로고    scopus 로고
    • Analyzing peer-to-peer traffic across large networks
    • S. Sen and J. Wang, "Analyzing peer-to-peer traffic across large networks," IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219-232, 2005.
    • (2005) IEEE/ACM Transactions on Networking , vol.12 , Issue.2 , pp. 219-232
    • Sen, S.1    Wang, J.2
  • 31
  • 32
    • 46149111129 scopus 로고    scopus 로고
    • MSNBC, "http://www.msnbc.com."
  • 35
    • 33749397645 scopus 로고    scopus 로고
    • Inferring the extent of network address port translation at public/private internet boundaries, Tech
    • Rep. CAIA TR 020712A
    • G. Armitage, "Inferring the extent of network address port translation at public/private internet boundaries, Tech. Rep. CAIA TR 020712A, 2002.
    • (2002)
    • Armitage, G.1
  • 37
    • 46149092876 scopus 로고    scopus 로고
    • "Dummynet," http://info.iet.unipi.it/~luigi/ip dummynet/.
    • Dummynet1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.