메뉴 건너뛰기




Volumn 28, Issue 6, 2009, Pages 359-380

RIP - A robust IP access architecture

Author keywords

Anomalous traffic; Attack detection; Internet security; Secure architectures

Indexed keywords

COMPUTER SYSTEM FIREWALLS; INTERNET PROTOCOLS; INTRUSION DETECTION; NETWORK ARCHITECTURE;

EID: 67649827198     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.02.002     Document Type: Article
Times cited : (3)

References (42)
  • 2
    • 3042825073 scopus 로고    scopus 로고
    • IP traceback: a new denial-of- service deterrent
    • Aljifri H. IP traceback: a new denial-of- service deterrent. IEEE Security and Privacy (June 2003) 24-31
    • (2003) IEEE Security and Privacy , pp. 24-31
    • Aljifri, H.1
  • 3
    • 85158156788 scopus 로고    scopus 로고
    • Barford P, Crovella M. Generating representative web workloads for network and server performance evaluation. In: Proceedings of ACM SIGMETRICS, July 1998, p. 151-60.
    • Barford P, Crovella M. Generating representative web workloads for network and server performance evaluation. In: Proceedings of ACM SIGMETRICS, July 1998, p. 151-60.
  • 5
    • 85158079328 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center. Advisories; 2007.
    • (2007) Advisories
  • 6
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: a taxonomy
    • Chakrabarti A., and Manimaran G. Internet infrastructure security: a taxonomy. IEEE Network 16 6 (November 2002) 13-21
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 7
    • 85158119442 scopus 로고    scopus 로고
    • ContentGuard, Inc. eXtensible rights markup language, XrML 2.0; 2001.
    • ContentGuard, Inc. eXtensible rights markup language, XrML 2.0; 2001.
  • 8
    • 0001939946 scopus 로고    scopus 로고
    • Heavy-tailed probability distributions in the world wide web
    • Chapman & Hall, New York [chapter 1]
    • Crovella M., Taqqu M., and Bestavros A. Heavy-tailed probability distributions in the world wide web. A practical guide to heavy tails (1998), Chapman & Hall, New York 3-26 [chapter 1]
    • (1998) A practical guide to heavy tails , pp. 3-26
    • Crovella, M.1    Taqqu, M.2    Bestavros, A.3
  • 10
    • 34547566649 scopus 로고    scopus 로고
    • High-speed dynamic packet filtering
    • Deri L. High-speed dynamic packet filtering. Journal of Network and System Management 15 3 (June 2007) 401-415
    • (2007) Journal of Network and System Management , vol.15 , Issue.3 , pp. 401-415
    • Deri, L.1
  • 11
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
    • Hwang K., Cai M., Chen Y., and Qin M. Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing 4 1 (January-March 2007) 41-55
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 13
    • 33749028591 scopus 로고    scopus 로고
    • Available online
    • Intrusense Packit. Network injection and capture. Available online: http://www.intrusense.com/software/packit.
    • Network injection and capture
  • 16
    • 33847303101 scopus 로고    scopus 로고
    • Blinc: Multilevel traffic classification in the dark
    • Philadelphia, USA, August
    • Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilevel traffic classification in the dark. In: SIGCOMM'05, Philadelphia, USA, August 2005, vol. 35, no. 4, p. 229-40.
    • (2005) SIGCOMM'05 , vol.35 , Issue.4 , pp. 229-240
    • Karagiannis, T.1    Papagiannaki, K.2    Faloutsos, M.3
  • 17
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistics-based overload control against distributed denial of service attacks
    • Kim Y, Lau WC, Chuah MC, Chao HJ. PacketScore: statistics-based overload control against distributed denial of service attacks. In: Proceedings of INFOCOM; 2004.
    • (2004) Proceedings of INFOCOM
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 20
    • 85158123980 scopus 로고    scopus 로고
    • Mirkovic J, Prier G, Reiher P. Attacking DDoS at the source. In: Proceedings of 10th IEEE international conference on network protocols, November 2002, pp. 312-21.
    • Mirkovic J, Prier G, Reiher P. Attacking DDoS at the source. In: Proceedings of 10th IEEE international conference on network protocols, November 2002, pp. 312-21.
  • 24
    • 85158113972 scopus 로고    scopus 로고
    • OASIS. Assertions and protocols for the OASIS security assertion markup language (SAML) V2.0; March 2005.
    • OASIS. Assertions and protocols for the OASIS security assertion markup language (SAML) V2.0; March 2005.
  • 25
    • 85158083183 scopus 로고    scopus 로고
    • OASIS. eXtensible access control markup language (XACML) version 2.0; February 2005
    • OASIS. eXtensible access control markup language (XACML) version 2.0; February 2005.
  • 26
    • 85158115712 scopus 로고    scopus 로고
    • Oasis. XACML v3.0 administrative policy, working draft; December 2005.
    • Oasis. XACML v3.0 administrative policy, working draft; December 2005.
  • 29
    • 85158133476 scopus 로고    scopus 로고
    • PCAP Public Repository. Available online
    • PCAP Public Repository. Available online: http://wwwnrg.ee.lbl.gov.
  • 30
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng T., Leckie C., and Ramamohanarao K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39 1 (April 2007)
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 32
    • 38049136694 scopus 로고    scopus 로고
    • Packet capture in 10-Gigabit ethernet environments using contemporary commodity hardware
    • p. 207-17
    • Schneider F., Wallerich J., and Feldmann A. Packet capture in 10-Gigabit ethernet environments using contemporary commodity hardware. Lecture notes in computer science vol. 4427 (2007) p. 207-17
    • (2007) Lecture notes in computer science , vol.4427
    • Schneider, F.1    Wallerich, J.2    Feldmann, A.3
  • 35
    • 85158076206 scopus 로고    scopus 로고
    • Shannon C, Moore D, Aben E. The CAIDA backscatter 2004-2005, IDA's Network Telescope. Available online: http://www.caida.org/data/passive/backscatter_2004_2005_dataset.xml.
    • Shannon C, Moore D, Aben E. The CAIDA backscatter 2004-2005, IDA's Network Telescope. Available online: http://www.caida.org/data/passive/backscatter_2004_2005_dataset.xml.
  • 40
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • Philadelphia, USA, August
    • Xu K, Zhang Z-L, Bhattacharyya S. Profiling internet backbone traffic: behavior models and applications. In: SIGCOMM'05, Philadelphia, USA, August 2005, p. 169-80.
    • (2005) SIGCOMM'05 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.