메뉴 건너뛰기




Volumn , Issue , 2007, Pages 43-48

The case for public work

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; CLIENT PUZZLES; DENIAL-OF -SERVICE; DISTRIBUTED DENIAL-OF-SERVICE ATTACKS; FUNDAMENTAL PROBLEMS; GLOBAL INTERNET; NETWORK DEVICES; NETWORK LINKS; NETWORKED SYSTEMS; NEW APPROACHES; PORT SCANNING; PUBLICLY VERIFIABLE; WORK FUNCTIONS; WORK SYSTEMS;

EID: 48349105467     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GI.2007.4301429     Document Type: Conference Paper
Times cited : (9)

References (38)
  • 7
    • 0038404196 scopus 로고    scopus 로고
    • Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles
    • May
    • D. Yau, J. Lui, and F. Liang, "Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles," in Proceedings of IWQoS, May 2002.
    • (2002) Proceedings of IWQoS
    • Yau, D.1    Lui, J.2    Liang, F.3
  • 8
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet Denial-of-Service with Capabilities
    • November
    • T. Anderson, T. Roscoe, and D. Wetherall, "Preventing Internet Denial-of-Service with Capabilities," in HotNets, November 2003.
    • (2003) HotNets
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 10
    • 0001126172 scopus 로고
    • Pricing via Processing or Combatting Junk Mail
    • August
    • C. Dwork and M. Naor, "Pricing via Processing or Combatting Junk Mail," in CRYPTO, August 1992.
    • (1992) CRYPTO
    • Dwork, C.1    Naor, M.2
  • 11
    • 0002459783 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Defense Against Connection Depletion
    • February
    • A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," in NDSS, February 1999.
    • (1999) NDSS
    • Juels, A.1    Brainard, J.2
  • 13
    • 14844310899 scopus 로고    scopus 로고
    • Hashcash: A Denial of Service Counter-Measure
    • Tech. Rep, Cypherspace, August
    • A. Back, "Hashcash: A Denial of Service Counter-Measure," Tech. Rep., Cypherspace, August 2002, http://www.hashcash.org/papers/hashcash.pdf.
    • (2002)
    • Back, A.1
  • 17
    • 36049043721 scopus 로고    scopus 로고
    • The Case for Pushing DNS
    • November
    • M. Handley and A. Greenhalgh, "The Case for Pushing DNS," in HotNets, November 2005.
    • (2005) HotNets
    • Handley, M.1    Greenhalgh, A.2
  • 18
    • 33646047928 scopus 로고    scopus 로고
    • The Design and Implementation of a Next Generation Name Service for the Internet
    • August
    • V. Ramasubramanian and E. Sirer, "The Design and Implementation of a Next Generation Name Service for the Internet," in ACM SIGCOMM, August 2004.
    • (2004) ACM SIGCOMM
    • Ramasubramanian, V.1    Sirer, E.2
  • 19
    • 36348977485 scopus 로고    scopus 로고
    • Complexity and Completeness of Finding Another Solution and Its Application to Puzzles,
    • Tech. Rep, University of Tokyo Master Thesis, January
    • T. Yato, "Complexity and Completeness of Finding Another Solution and Its Application to Puzzles," Tech. Rep., University of Tokyo Master Thesis, January 2003.
    • (2003)
    • Yato, T.1
  • 20
    • 43249096003 scopus 로고    scopus 로고
    • Hash Function Balance and its Impact on Birthday Attacks
    • May
    • M. Bellare and T. Kohno, "Hash Function Balance and its Impact on Birthday Attacks," in EUROCRYPT, May 2004.
    • (2004) EUROCRYPT
    • Bellare, M.1    Kohno, T.2
  • 21
    • 33845584959 scopus 로고    scopus 로고
    • Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
    • September
    • L. Fan, P. Cao, J. Almeida, and A. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol," in ACM SIGCOMM, September 1998.
    • (1998) ACM SIGCOMM
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.4
  • 30
    • 4544360452 scopus 로고    scopus 로고
    • New Directions in Traffic Measurement and Accounting
    • August
    • C. Estan and G. Varghese, "New Directions in Traffic Measurement and Accounting," in ACM SIGCOMM, August 2002.
    • (2002) ACM SIGCOMM
    • Estan, C.1    Varghese, G.2
  • 32
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)
    • August
    • A. Kuzmanovic and E. Knightly, "Low-rate TCP-targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)," in ACM SIGCOMM, August 2003.
    • (2003) ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.2
  • 34
    • 79961236654 scopus 로고    scopus 로고
    • The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
    • July
    • R. Beverly and S. Bauer, "The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet," in SRUTI, July 2005.
    • (2005) SRUTI
    • Beverly, R.1    Bauer, S.2
  • 35
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    • July
    • V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," ACM SIGCOMM CCR, vol. 31, no. 3, July 2001.
    • (2001) ACM SIGCOMM CCR , vol.31 , Issue.3
    • Paxson, V.1
  • 37
    • 70349748341 scopus 로고    scopus 로고
    • Strange Attractors and TCP/IP Sequence Number Analysis,
    • Tech. Rep, Bindview, April 2001
    • M. Zalewski, "Strange Attractors and TCP/IP Sequence Number Analysis," Tech. Rep., Bindview, April 2001, http://razor.bindview.com/ publish/papers/tcpseq.html.
    • Zalewski, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.