메뉴 건너뛰기




Volumn , Issue , 2011, Pages 63-70

A trust-based approach against IP-spoofing attacks

Author keywords

Access Router; Autonomous System; Bayesian Inference; IP spoofing; Trust

Indexed keywords

ACCESS ROUTERS; AUTONOMOUS SYSTEMS; BAYESIAN INFERENCE; IP-SPOOFING; TRUST;

EID: 80052081335     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2011.5971965     Document Type: Conference Paper
Times cited : (27)

References (24)
  • 1
    • 70449561018 scopus 로고    scopus 로고
    • Design of traceback methods for tracking DoS attacks
    • April
    • Priescu, I. , Nicolaescu, S. , and Bica, I. , "Design of Traceback Methods for Tracking DoS Attacks," IACSITSC '09, pp. 117-121, April 2009
    • (2009) IACSITSC '09 , pp. 117-121
    • Priescu, I.1    Nicolaescu, S.2    Bica, I.3
  • 2
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack-detection techniques
    • DOI 10.1109/MIC.2006.5
    • Carl, G. , Kesidis, G. , Brooks, R. R. , and Suresh R. , "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006 (Pubitemid 43159617)
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.R.3    Rai, S.4
  • 6
    • 70349659341 scopus 로고    scopus 로고
    • Adaptive early packet filtering for defending firewalls against DoS attacks
    • 19-25 April
    • El-Atawy, A. , Al-Shaer, E. , Tran, T. , Boutaba, R. , "Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks," INFOCOM 2009, IEEE, pp. 2437-2445, 19-25 April 2009
    • (2009) INFOCOM 2009, IEEE , pp. 2437-2445
    • El-Atawy, A.1    Al-Shaer, E.2    Tran, T.3    Boutaba, R.4
  • 8
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Sep
    • Michiardi, P. , and Molva, R. , "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Commun. Multimedia Security, pp. 107-121, Sep. 2002
    • (2002) Commun. Multimedia Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 9
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Sun, Y. , Yu, W. , Han, Z. , Liu, K. , "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 305-317,. 2006
    • (2006) Selected Areas in Communications, IEEE Journal on , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 10
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • DOI 10.1109/JSAC.2005.861390
    • Theodorakopoulos, G. , Baras, J. S. , "On trust models and trust evaluation metrics for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 318-328, Feb. 2006 (Pubitemid 43269752)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 11
    • 34250782069 scopus 로고    scopus 로고
    • A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
    • DOI 10.1109/RIVF.2007.369149, 4223066, 2007 IEEE International Conference on Research, Innovation and Vision for the Future, RIVF 2007
    • Nguyen, C. , Camp, O. , Loiseau, S. , "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," Research, Innovation and Vision for the Future, 2007 IEEE International Conference on, pp. 144-151, 5-9 March 2007 (Pubitemid 46950598)
    • (2007) 2007 IEEE International Conference on Research, Innovation and Vision for the Future, RIVF 2007 , pp. 144-151
    • Nguyen, C.T.1    Camp, O.2    Loiseau, S.3
  • 13
    • 84946651784 scopus 로고
    • Attitudes and cognitive organization
    • Heider, F. , Attitudes and cognitive organization. Journal of Psychology, 21: 107-112, 1946.
    • (1946) Journal of Psychology , vol.21 , pp. 107-112
    • Heider, F.1
  • 14
    • 78649304570 scopus 로고    scopus 로고
    • Trust formation based on subjective logic and PGP web-of-trust for information sharing in mobile ad hoc networks
    • IEEE Second International Conference on, 20-22 Aug
    • Bakar, A. , Ahmad, A. , Ismail, R. , Manan, J. , "Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc Networks," Social Computing (SocialCom), 2010 IEEE Second International Conference on, pp. 1004-1009, 20-22 Aug. 2010
    • (2010) Social Computing (SocialCom), 2010 , pp. 1004-1009
    • Bakar, A.1    Ahmad, A.2    Ismail, R.3    Manan, J.4
  • 18
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • DOI 10.1109/TNET.2006.890133
    • Wang, H. , Jin, C. , Shin, K. , "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," Networking, IEEE/ACM Transactions on , vol. 15, no. 1, pp. 40-53, Feb. 2007 (Pubitemid 46464416)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 23
    • 0033715573 scopus 로고    scopus 로고
    • Web traffic modeling exploiting TCP connections' temporal clustering through HTML-REDUCE
    • May/Jun
    • Molina, M. , Castelli, P. , Foddis, G. , "Web traffic modeling exploiting TCP connections' temporal clustering through HTML-REDUCE," Network, IEEE, vol. 14, no. 3, pp. 46-55, May/Jun 2000
    • (2000) Network, IEEE , vol.14 , Issue.3 , pp. 46-55
    • Molina, M.1    Castelli, P.2    Foddis, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.