메뉴 건너뛰기




Volumn 19 LNICST, Issue , 2009, Pages 448-458

The Frog-Boiling attack: Limitations of anomaly detection for secure network coordinate systems

Author keywords

Anomaly detection; Network coordinate systems; Vivaldi

Indexed keywords

ANOMALY DETECTION; BITTORRENT; EUCLIDEAN; NETWORK COORDINATE SYSTEMS; NETWORK COORDINATES; NETWORK LATENCIES; OUTLIER DETECTION; SECURE NETWORKS; VIVALDI;

EID: 84857258999     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05284-2_26     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 1
    • 0036346553 scopus 로고    scopus 로고
    • Predicting internet network distance with coordinates-based approaches
    • INFOCOM
    • Ng, T.S.E., Zhang, H.: Predicting Internet Network Distance with Coordinates-Based Approaches. In: Proceedings of IEEE, INFOCOM (2002)
    • (2002) Proceedings of IEEE
    • Ng, T.S.E.1    Zhang, H.2
  • 3
    • 84885893284 scopus 로고    scopus 로고
    • Azureus, http://azureus.sourceforge.net
  • 4
    • 84885890793 scopus 로고    scopus 로고
    • Vuze Forums, http://forum.vuze.com/thread.jspa?threadID=80764
  • 14
    • 84885891282 scopus 로고    scopus 로고
    • Pyxida, http://pyxida.sourceforge.net
  • 15
    • 84885883575 scopus 로고    scopus 로고
    • PlanetLab, http://planet-lab.org
  • 20
  • 21
    • 84885887804 scopus 로고    scopus 로고
    • CommonSense, http://www.kimvdlinde.com/professional/programming/ statistics/commonSense/body.html
    • CommonSense
  • 23
    • 85077073973 scopus 로고    scopus 로고
    • Veracity: Practical secure network coordinates via vote-based agreements
    • Sherr, M., Blaze, M., Loo, B.T.: Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In: USENIX Annual Technical Conference (2009)
    • (2009) USENIX Annual Technical Conference
    • Sherr, M.1    Blaze, M.2    Loo, B.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.