메뉴 건너뛰기




Volumn , Issue , 2009, Pages 2446-2454

Optimal filtering of source address prefixes: Models and algorithms

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL LISTS; BUILDING BLOCKES; COMPUTATIONALLY EFFICIENT; COST-EFFICIENT; DIFFERENT ATTACKS; DISTRIBUTED DENIAL OF SERVICE ATTACK; FILTER SELECTION; MALICIOUS CODES; MALICIOUS TRAFFIC; MULTIDIMENSIONAL KNAPSACK PROBLEMS; NETWORK INFRASTRUCTURE; OPTIMAL FILTERING; RESOURCE ALLOCATION PROBLEM; SCARCE RESOURCES; SOURCE ADDRESS; TERNARY CONTENT ADDRESSABLE MEMORIES;

EID: 70349658385     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062172     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 1
    • 70349714146 scopus 로고    scopus 로고
    • Cisco Systems, White Paper, Understanding acl on catalyst 6500 series switches, www.cisco.com/en/US/products/hw/switches/ps708/products- white-paper09186a00800c9470.shtml.
    • Cisco Systems, White Paper, "Understanding acl on catalyst 6500 series switches," www.cisco.com/en/US/products/hw/switches/ps708/products- white-paper09186a00800c9470.shtml.
  • 2
    • 70349698644 scopus 로고    scopus 로고
    • Cisco Systems, White Paper, Protecting your core: Infrastructure protection access control lists, http://www.cisco.com/en/US/tech/tk648/ tk361/technologies-white-paper09186a00801a1a55.shtml.
    • Cisco Systems, White Paper, "Protecting your core: Infrastructure protection access control lists," http://www.cisco.com/en/US/tech/tk648/ tk361/technologies-white-paper09186a00801a1a55.shtml.
  • 3
    • 70349720279 scopus 로고    scopus 로고
    • Dshield http://www.dshield.org/
    • Dshield
  • 6
    • 70349701848 scopus 로고    scopus 로고
    • Technical Report arXiv:cs.NI/0811.3828
    • Nov
    • F. Soldo, A. Markopoulou, K. Argyraki, "Optimal Filtering of Malicious IP Sources", Technical Report arXiv:cs.NI/0811.3828, Nov. 2008
    • (2008)
    • Soldo, F.1    Markopoulou, A.2    Argyraki, K.3
  • 7
    • 85013625593 scopus 로고
    • Computational complexity of approximation algorithms for combinatorial problems
    • Mathematical Foundations of Computer Science, Springer
    • G.V. Gens and E.V. Levner, "Computational complexity of approximation algorithms for combinatorial problems", in Mathematical Foundations of Computer Science, LNCS, vol. 74, pp. 292-300, Springer 1979.
    • (1979) LNCS , vol.74 , pp. 292-300
    • Gens, G.V.1    Levner, E.V.2
  • 9
    • 51349126234 scopus 로고    scopus 로고
    • Spatial-Temporal Characteristics of Internet Malicious Sources
    • April
    • Z. Chen, C. Ji, P. Barford, "Spatial-Temporal Characteristics of Internet Malicious Sources," in IEEE INFOCOM (Mini-Conf.), April 2008.
    • (2008) IEEE INFOCOM (Mini-Conf.)
    • Chen, Z.1    Ji, C.2    Barford, P.3
  • 10
    • 33947198115 scopus 로고    scopus 로고
    • Observed structure of addresses in IP traffic
    • Dec
    • E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic," IEEE/ACM ToN 14(6), pp. 1207-1218, Dec. 2006.
    • (2006) IEEE/ACM ToN , vol.14 , Issue.6 , pp. 1207-1218
    • Kohler, E.1    Li, J.2    Paxson, V.3    Shenker, S.4
  • 12
    • 66249102841 scopus 로고    scopus 로고
    • To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets
    • Seattle, Aug
    • X. Liu, X. Yang, Y. Lu, "To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets," in ACM SIGCOMM 2008, Seattle, Aug. 2008.
    • (2008) ACM SIGCOMM
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 13
    • 79961236654 scopus 로고    scopus 로고
    • The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet
    • R. Beverly, S. Bauer, "The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet," in SRUTI 2005.
    • (2005) SRUTI
    • Beverly, R.1    Bauer, S.2
  • 16
    • 85083279650 scopus 로고    scopus 로고
    • Passport: Secure and Adoptable Source Authentication
    • NSDI 2008
    • X. Liu, A. Li, X. Yang, D. Wetherall, "Passport: Secure and Adoptable Source Authentication," in Proc. USENIX/ACM NSDI 2008.
    • Proc. USENIX/ACM
    • Liu, X.1    Li, A.2    Yang, X.3    Wetherall, D.4
  • 17
    • 50049083120 scopus 로고    scopus 로고
    • On Filtering of DDoS Attacks Based on Source Address Prefixes
    • Aug
    • G. Pack, J. Yoon, E. Collins, C. Estan, "On Filtering of DDoS Attacks Based on Source Address Prefixes," in Proc. of SecureComm, Aug. 2006.
    • (2006) Proc. of SecureComm
    • Pack, G.1    Yoon, J.2    Collins, E.3    Estan, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.