메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Accountability as a service

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SERVICES; NEW APPLICATIONS;

EID: 47249151432     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (31)
  • 2
    • 85050149881 scopus 로고    scopus 로고
    • Active Internet traffic filtering: Real-time response to denial-of-service attacks
    • K. Argyraki and D. R. Cheriton. Active Internet traffic filtering: Real-time response to denial-of-service attacks. In USENIX Annual Technical Conference, 2005.
    • (2005) USENIX Annual Technical Conference
    • Argyraki, K.1    Cheriton, D. R.2
  • 4
    • 85092759913 scopus 로고    scopus 로고
    • Cookies along trust-boundaries: Accurate and deployable flood protection
    • M. Casado, et al. Cookies along trust-boundaries: Accurate and deployable flood protection. In USENIX SRUTI, 2006.
    • (2006) USENIX SRUTI
    • Casado, M.1
  • 7
    • 85092762398 scopus 로고    scopus 로고
    • The rising tide: DDoS from defective designs and defaults
    • R. Clayton. The rising tide: DDoS from defective designs and defaults. In USENIX SRUTI, 2006.
    • (2006) USENIX SRUTI
    • Clayton, R.1
  • 12
    • 0009485168 scopus 로고    scopus 로고
    • IPNL: A NAT-extended Internet architecture
    • P. Francis and R. Gummadi. IPNL: A NAT-extended Internet architecture. In ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Francis, P.1    Gummadi, R.2
  • 15
    • 65249174426 scopus 로고    scopus 로고
    • Efficient and secure source authentication with packet passports
    • X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and secure source authentication with packet passports. In USENIX SRUTI, 2006.
    • (2006) USENIX SRUTI
    • Liu, X.1    Yang, X.2    Wetherall, D.3    Anderson, T.4
  • 16
    • 0010057139 scopus 로고    scopus 로고
    • Analysis of the autonomous system network topology
    • D. Magoni and J.-J. Pansiot. Analysis of the autonomous system network topology. ACM CCR, 31(3):26-37, 2001.
    • (2001) ACM CCR , vol.31 , Issue.3 , pp. 26-37
    • Magoni, D.1    Pansiot, J.-J.2
  • 17
    • 4544272175 scopus 로고    scopus 로고
    • Controlling high-bandwidth aggregates in the network
    • R. Mahajan, et al. Controlling high-bandwidth aggregates in the network. ACM CCR, 32(3):62-73, 2002.
    • (2002) ACM CCR , vol.32 , Issue.3 , pp. 62-73
    • Mahajan, R.1
  • 18
    • 85092760921 scopus 로고    scopus 로고
    • MAPS
    • MAPS. http://www.mail-abuse.com/.
  • 19
    • 33744502431 scopus 로고    scopus 로고
    • The dark side of the web: An open proxy's view
    • V. S. Pai, et al. The dark side of the web: An open proxy's view. In ACM HotNets, 2003.
    • (2003) ACM HotNets
    • Pai, V. S.1
  • 20
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web transactions with crowds
    • M. K. Reiter and A. D. Rubin. Anonymous Web transactions with crowds. Communications of the ACM, 42(2):32-48, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M. K.1    Rubin, A. D.2
  • 21
    • 0001161454 scopus 로고    scopus 로고
    • The end-to-end effects of Internet path selection
    • S. Savage, et al. The end-to-end effects of Internet path selection. In ACM SIGCOMM, 1999.
    • (1999) ACM SIGCOMM
    • Savage, S.1
  • 22
    • 85093874083 scopus 로고    scopus 로고
    • AS-based accountability as a cost-effective DDoS defense
    • D. R. Simon, S. Agarwal, and D. A. Maltz. AS-based accountability as a cost-effective DDoS defense. In USENIX HotBots, 2007.
    • (2007) USENIX HotBots
    • Simon, D. R.1    Agarwal, S.2    Maltz, D. A.3
  • 23
    • 0001887844 scopus 로고    scopus 로고
    • Hash-based IP traceback
    • A. C. Snoeren, et al. Hash-based IP traceback. In ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Snoeren, A. C.1
  • 25
    • 0038322587 scopus 로고    scopus 로고
    • Internet indirection infrastructure
    • I. Stoica, et al. Internet indirection infrastructure. In ACM SIGCOMM, 2002.
    • (2002) ACM SIGCOMM
    • Stoica, I.1
  • 27
    • 38349038696 scopus 로고    scopus 로고
    • Sender policy framework (SPF) for authorizing use of domains in e-mail
    • IETF RFC-4408, Experimental
    • M. W. Wong and W. Schlitt. Sender policy framework (SPF) for authorizing use of domains in e-mail. IETF RFC-4408, 2006. Experimental.
    • (2006)
    • Wong, M. W.1    Schlitt, W.2
  • 29
    • 38549092255 scopus 로고    scopus 로고
    • NIRA: A new Internet routing architecture
    • X. Yang. NIRA: A new Internet routing architecture. In ACM SIGCOMM FDNA Workshop, 2003.
    • (2003) ACM SIGCOMM FDNA Workshop
    • Yang, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.