메뉴 건너뛰기




Volumn , Issue , 2011, Pages 19-24

A deployable approach for inter-AS anti-spoofing

Author keywords

Inter AS; IP Spoofing; Packet Filtering

Indexed keywords

AUTONOMOUS SYSTEMS; BORDER ROUTERS; DENIAL OF SERVICE ATTACKS; DEPLOYABILITY; DEPLOYMENT COSTS; EVALUATION RESULTS; FILTERING EFFICIENCY; INTER-AS; INTERNET DATA; IP PACKETS; IP SPOOFING; MAINTENANCE COST; NETWORK DIAGNOSIS; PACKET FILTERING; SOURCE ADDRESS;

EID: 84055179063     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2011.6089052     Document Type: Conference Paper
Times cited : (11)

References (26)
  • 2
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," Proc. ACM SIGCOMM Computer Communication Review, 2001, pp. 15-26.
    • Proc. ACM SIGCOMM Computer Communication Review, 2001 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 9
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • DOI 10.1145/505659.505664
    • V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," ACM SIGCOMM Computer Communication Review, vol. 31, no. 3, 2001, pp. 38-47. (Pubitemid 33586487)
    • (2001) Computer Communication Review , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 10
    • 84055206144 scopus 로고    scopus 로고
    • Worldwide infrastructure security report
    • D. Roland and M. Carlos, "Worldwide infrastructure security report,"Arbor Networks, vol. VI, 2010.
    • (2010) Arbor Networks , vol.6
    • Roland, D.1    Carlos, M.2
  • 16
    • 67651124925 scopus 로고    scopus 로고
    • Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
    • J. Bi, B. Liu, J. Wu and Y. Shen, "Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method," Tsinghua Science & Technology, vol. 14, no. 4, 2009, pp. 413-422.
    • (2009) Tsinghua Science & Technology , vol.14 , Issue.4 , pp. 413-422
    • Bi, J.1    Liu, B.2    Wu, J.3    Shen, Y.4
  • 23
    • 49649117422 scopus 로고    scopus 로고
    • New routing algorithms in trustworthy Internet
    • X. Wang, L. Guo, T. Yang, W. Ji, Y. Li, X. Liu, et al., "New routing algorithms in trustworthy Internet," Computer Communications, vol. 31, no. 14, 2008, pp. 3533-3536.
    • (2008) Computer Communications , vol.31 , Issue.14 , pp. 3533-3536
    • Wang, X.1    Guo, L.2    Yang, T.3    Ji, W.4    Li, Y.5    Liu, X.6
  • 24
    • 84855462493 scopus 로고    scopus 로고
    • 4/29
    • "IPv4 Routed /24 AS Links Dataset," http://www.caida.org/data/ active/ipv4-routed-topology-aslinks-dataset.xml, 4/29/2011.
    • (2011) IPv4 Routed /24 AS Links Dataset
  • 26
    • 84855428291 scopus 로고    scopus 로고
    • CNGI-CERNET2, http://www.cernet2.edu.cn/index-en.htm.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.