메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1087-1094

Hash tables for efficient flow monitoring: vulnerabilities and countermeasures

Author keywords

Denial of service; Flow monitoring; Hash collision; Targeted attacks

Indexed keywords

COMPUTATIONAL POWER; DENIAL OF SERVICE; FLOW MONITORING; HASH ALGORITHM; HASH COLLISIONS; HASH TABLE; HASH VALUE; LOOKUPS; NETWORK MONITORING TOOLS; OPTIMAL CONDITIONS; OPTIMAL UTILIZATION; SOFTWARE-BASED; VERMONT;

EID: 77951260620     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2009.5355211     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 2
    • 84879974400 scopus 로고    scopus 로고
    • Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions
    • Kassel, Germany: Springer, March
    • T. Limmer and F. Dressler, "Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions," in 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009). Kassel, Germany: Springer, March 2009, pp. 179-190.
    • (2009) 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009) , pp. 179-190
    • Limmer, T.1    Dressler, F.2
  • 9
    • 0024065804 scopus 로고
    • Computation of Cyclic Redundancy Checks via Table Look-Up
    • D. V. Sarwate, "Computation of Cyclic Redundancy Checks via Table Look-Up," Communications of the ACM, vol. 31, no. 8, pp. 1008-1013, 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.8 , pp. 1008-1013
    • Sarwate, D.V.1
  • 10
    • 55749101227 scopus 로고    scopus 로고
    • April [Online]. Available
    • Anarchriz/DREAD, "CRC and how to Reverse it," April 1999. [Online]. Available: http://www.woodmann.com/RCE-CD-SITES/Anachriz/programming/ crc.htm
    • (1999) CRC and How to Reverse It
  • 11
    • 0017321603 scopus 로고
    • Evaluation of error detection polynomial performance on the AUTOVON channel
    • New Orleans, LA: IEEE, December 8-25
    • K. Brayer and J. L. Hammond Jr, "Evaluation of error detection polynomial performance on the AUTOVON channel," in National Telecommunications Conference, vol. 1. New Orleans, LA: IEEE, December 1975, pp. 8-21 to 8-25.
    • (1975) National Telecommunications Conference , vol.1 , pp. 8-21
    • Brayer, K.1    Hammond Jr., J.L.2
  • 14
    • 84880380775 scopus 로고    scopus 로고
    • [Online]. Available
    • A. Turner, "tcpreplay." [Online]. Available: http://tcpreplay.synfin.net/trac/wiki/tcpreplay
    • Tcpreplay
    • Turner, A.1
  • 18
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • 19th International Cryptology Conference (Advances in Cryptology, CRYPTO '99), Vol. Santa Barbara, CA, August
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: Fast and secure message authentication," in 19th International Cryptology Conference (Advances in Cryptology, CRYPTO '99), vol.LNCS 1666, Santa Barbara, CA, August 1999, pp. 216-233.
    • (1999) LNCS , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.