메뉴 건너뛰기




Volumn 14, Issue 3, 2011, Pages

The Frog-Boiling attack: Limitations of secure network coordinate systems

Author keywords

Attack; Network coordinate; Secure

Indexed keywords

ATTACK; BITTORRENT; DISTRIBUTED REPUTATION SYSTEMS; EUCLIDEAN; NETWORK COORDINATE; NETWORK COORDINATES; NETWORK LATENCIES; OUTLIER DETECTION; SECURE; SECURE NETWORKS; STATISTICAL MEAN;

EID: 84855230119     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2043621.2043627     Document Type: Conference Paper
Times cited : (27)

References (42)
  • 3
    • 84855234355 scopus 로고    scopus 로고
    • (accessed 2009)
    • BAMBOO DHT. http://bamboo-dht.org. (accessed 2009).
  • 6
    • 32344438389 scopus 로고    scopus 로고
    • On the establishment of distinct identifies in overlay networks
    • DOI 10.1145/1073814.1073873, Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005
    • BAZZI, R. A. AND KONJEVOD, G. 2005. On the establishment of distinct identities in overlay networks. In Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing (PODC'05). ACM, New York, NY, 312-320. (Pubitemid 43218411)
    • (2005) Proceedings of the Annual ACM Symposium on Principles of Distributed Computing , vol.24 , pp. 312-320
    • Bazzi, R.A.1    Konjevod, G.2
  • 8
    • 65249126676 scopus 로고    scopus 로고
    • Taming the torrent: A practical approach to reducing cross-isp traffic in peer-to-peer systems
    • CHOFFNES, D. R. AND BUSTAMANTE, F. E. 2008. Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. SIGCOMM Comput. Comm. Rev. 38, 4, 363-374.
    • (2008) SIGCOMM Comput. Comm. Rev. , vol.38 , Issue.4 , pp. 363-374
    • Choffnes, D.R.1    Bustamante, F.E.2
  • 9
    • 84855222693 scopus 로고    scopus 로고
    • COMMONSENSE (Accessed 2008)
    • COMMONSENSE. 2008. http://www.kimvdlinde.com/professional/programming/ statistics/ commonSense/body.html. (Accessed 2008).
    • (2008)
  • 12
    • 21844440623 scopus 로고    scopus 로고
    • Vivaldi: A decentralized network coordinate system
    • DOI 10.1145/1030194.1015471, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • DABEK, F., COX, R., KAASHOEK, F., AND MORRIS, R. 2004a. Vivaldi: A decentralized network coordinate system. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'04). ACM, New York, NY, 15-26. (Pubitemid 40954866)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 15-26
    • Dabek, F.1    Cox, R.2    Kaashoek, F.3    Morris, R.4
  • 14
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2, 222-232.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 22
    • 85024429815 scopus 로고
    • A new approach to linear filtering and prediction problems
    • Series D
    • KALMAN, R. E. 1960. A new approach to linear filtering and prediction problems. Trans. ASME J. Basic Engin. 82, Series D, 35-45.
    • (1960) Trans. ASME J. Basic Engin. , vol.82 , pp. 35-45
    • Kalman, R.E.1
  • 29
    • 0036346553 scopus 로고    scopus 로고
    • Predicting internet network distance with coordinates-based approaches
    • NG, T. S. E. AND ZHANG, H. 2001. Predicting internet network distance with coordinates-based approaches. In Proceedings of the IEEE INFOCOM. 170-179.
    • (2001) Proceedings of the IEEE INFOCOM , pp. 170-179
    • E, N.G.T.S.1    Zhang, H.2
  • 33
    • 84855244199 scopus 로고    scopus 로고
    • Accessed 2010
    • PLANETLAB. http://planet-lab.org. (Accessed 2010).
  • 34
    • 84855228783 scopus 로고    scopus 로고
    • (Accessed 2009)
    • PYXIDA. http://pyxida.sourceforge.net. (Accessed 2009).
  • 35
    • 33847324622 scopus 로고    scopus 로고
    • OpenDHT: A public DHT service and its uses
    • DOI 10.1145/1090191.1080102
    • RHEA, S., GODFREY, B., KARP, B., KUBIATOWICZ, J., RATNASAMY, S., SHENKER, S., STOICA, I., AND YU, H. 2005. Opendht: A public dht service and its uses. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05). ACM, New York, NY, 73-84. (Pubitemid 46323495)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 73-84
    • Rhea, S.1    Godfrey, B.2    Karp, B.3    Kubiatowicz, J.4    Ratnasamy, S.5    Shenker, S.6    Stoica, I.7    Yu, H.8
  • 37
    • 0041472446 scopus 로고    scopus 로고
    • Big-bang simulation for embedding network distances in Euclidean space
    • SHAVITT, Y. AND TANKEL, T. 2003. Big-bang simulation for embedding network distances in Euclidean space. In Proceedings of the IEEE INFOCOM.
    • (2003) Proceedings of the IEEE INFOCOM
    • Shavitt, Y.1    Tankel, T.2
  • 38
    • 85077073973 scopus 로고    scopus 로고
    • Veracity: Practical Secure Network Coordinates via Votebased Agreements
    • VUZE. (Accessed 2010).
    • SHERR, M., BLAZE, M., AND LOO, B. T. 2009. Veracity: Practical Secure Network Coordinates via Votebased Agreements. In Proceedings of the USENIX Annual Technical Conference. VUZE. http://azureus.sourceforge.net. (Accessed 2010).
    • (2009) Proceedings of the USENIX Annual Technical Conference
    • Sherr, M.1    Blaze, M.2    Loo, B.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.