메뉴 건너뛰기




Volumn , Issue , 2008, Pages 667-674

Anti-DDoS Virtualized Operating System

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK TRAFFIC; DDOS ATTACKS; EDGE-ROUTERS; EFFICIENT IMPLEMENTATION; INTERNATIONAL CONFERENCES; MALICIOUS TRAFFIC; NETWORK THROUGHPUT; OPERATING SYSTEMS; PACKET FILTERING; TRAFFIC CHARACTERIZATION; VIRTUALIZATION;

EID: 49049106371     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.120     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 1
    • 49049105571 scopus 로고    scopus 로고
    • What is Egress Filtering and How can I Implement it? Feb 2000, the SANS Institute
    • Online
    • C. Brenton, "What is Egress Filtering and How can I Implement it?" Feb 2000, the SANS Institute. [Online], Available: http: //www.sans.org/rr/paper.php?id=1059
    • Available: http
    • Brenton, C.1
  • 3
    • 49049114627 scopus 로고    scopus 로고
    • "Xensource," http://www.xensource.com/products/xen/.
  • 5
    • 49049106855 scopus 로고    scopus 로고
    • "Vmware," http://www.vmware.com/.
  • 6
    • 49049113351 scopus 로고    scopus 로고
    • "Virtual Server," http://www.microsoft.com/servers/default. mspx.
    • Virtual Server
  • 7
    • 84978438355 scopus 로고    scopus 로고
    • Scale and performance in the denali isolation kernel
    • Online, Available
    • A. Whitaker, M. Shaw, and S. D. Gribble, "Scale and performance in the denali isolation kernel," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 195-209, 2002. [Online]. Available: http://portal.acm.org/citation. cfm?id=844147
    • (2002) SIGOPS Oper. Syst. Rev , vol.36 , Issue.SI , pp. 195-209
    • Whitaker, A.1    Shaw, M.2    Gribble, S.D.3
  • 8
    • 84944955094 scopus 로고    scopus 로고
    • Online, Available
    • J. Dike, "A user-mode port of the Linux kernel," 2000. [Online]. Available: http://www.usenix.org/publications/library/Proceedings/ als2000/dike.html
    • (2000) A user-mode port of the Linux kernel
    • Dike, J.1
  • 11
    • 49049122122 scopus 로고    scopus 로고
    • J. Mirkovic, D-WARD: Source-end defense against distributed denial-of-service attacks, Ph.D. dissertation. [Online]. Available: citeseer.ist.psu.edu/mirkovic03dward.htinl
    • J. Mirkovic, "D-WARD: Source-end defense against distributed denial-of-service attacks," Ph.D. dissertation. [Online]. Available: citeseer.ist.psu.edu/mirkovic03dward.htinl
  • 13
    • 49049098367 scopus 로고    scopus 로고
    • CHECKPOINT INC. 1996. TCP SYN flooding attack and the firewall-1 SYNDefender. Checkpoint Inc
    • "CHECKPOINT INC. 1996. TCP SYN flooding attack and the firewall-1 SYNDefender. Checkpoint Inc.."
  • 15
    • 49049103647 scopus 로고    scopus 로고
    • "Xen networking," http://wiki.xensource.com/xenwiki/ XenNetworking.
    • Xen networking
  • 20
    • 84978401615 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Online, Available
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen, "Revirt: enabling intrusion analysis through virtual-machine logging and replay," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 211-224, 2002. [Online]. Available: http://portal.acm.org/citation.cfm?id=844148
    • (2002) SIGOPS Oper. Syst. Rev , vol.36 , Issue.SI , pp. 211-224
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.A.4    Chen, P.M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.