메뉴 건너뛰기




Volumn 27, Issue 6, 2013, Pages 60-65

Preventing DDoS attacks by identifier/locator separation

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; DDOS ATTACK; DISTRIBUTED DENIAL OF SERVICE ATTACK; IDENTIFIER-TO-LOCATOR MAPPINGS; IDENTIFIER/LOCATOR SEPARATIONS; NUMERICAL RESULTS; SCALING PROBLEM;

EID: 84890481146     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2013.6678928     Document Type: Article
Times cited : (47)

References (12)
  • 1
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • April
    • J. Mirkovic, P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Commun. Rev., vol. 34, no. 2, April 2004, pp. 39-53
    • (2004) ACM SIGCOMM Computer Commun. Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 2
    • 79551523280 scopus 로고    scopus 로고
    • IEEE Trans. Parallel and Distributed Systems Mar
    • S. Yu et al., "Traceback of DDoS Attacks Using Entroy Variations," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 3, Mar. 2011, pp. 412-25.
    • (2011) Traceback of ddos attacks using entroy variations , vol.22 , Issue.3 , pp. 412-425
    • Yu, S.1
  • 3
    • 84890517059 scopus 로고    scopus 로고
    • IP flow-based technology
    • "IP Flow-Based Technology," ArborNetworks, http://www. arbornetworks.com, 2010.
    • (2010) ArborNetworks
  • 4
    • 84886875487 scopus 로고    scopus 로고
    • Locator/ID Separation Protocol (LISP)
    • Jan
    • D. Farinacci et al., "Locator/ID Separation Protocol (LISP)," IETF RFC 6830, Jan. 2013.
    • (2013) IETF RFC , vol.6830
    • Farinacci, D.1
  • 5
    • 79952040446 scopus 로고    scopus 로고
    • Decoupling the design of identifierto-locator mapping services from identifiers
    • Mar
    • H. Luo, H. Zhang, and M. Zukerman, "Decoupling the Design of Identifierto-Locator Mapping Services from Identifiers," Computer Networks (Elsevier), vol. 55, no. 4, Mar. 2011, pp. 959-74.
    • (2011) Computer Networks Elsevier , vol.55 , Issue.4 , pp. 959-974
    • Luo, H.1    Zhang, H.2    Zukerman, M.3
  • 6
    • 84890448056 scopus 로고    scopus 로고
    • Trend Micro 2011 Threat Predictions: Mobile Devices and Diversity of Operating Systems Will Expand Cybercriminal Reach
    • Trend Micro 2011 Threat Predictions: Mobile Devices and Diversity of Operating Systems Will Expand Cybercriminal Reach, http://trendmicro.mediaroom. com/index.php?s=43&news-item=851&type =archived&year=2010.
  • 7
    • 84890481860 scopus 로고    scopus 로고
    • Identifier/locator separation: A worm detection and prevention perspective
    • Conf. Advanced Intelligence and Awareness Internet, Oct Shenzhen, China.
    • K. Wang, H. Luo, and Y. Qin, "Identifier/Locator Separation: A Worm Detection and Prevention Perspective," Proc. 2011 Int'l. Conf. Advanced Intelligence and Awareness Internet, Oct. 2011, Shenzhen, China.
    • (2011) Proc. 2011 Int'l
    • Wang, K.1    Luo, H.2    Qin, Y.3
  • 9
    • 84890538909 scopus 로고
    • Nonparametric Methods in Change-Point Problems Kluwer Academic
    • B. E. Brodsky and B. S. Darkhovsky, Nonparametric Methods in Change-Point Problems, Kluwer Academic, 1993.
    • (1993) Darkhovsky
    • Brodsky, B.E.1    Darkhovsky, S.B.2
  • 11
    • 84890535025 scopus 로고    scopus 로고
    • Cisco Locator/ID Separation Protocol Security
    • ]. Cisco Locator/ID Separation Protocol Security, http://www.cisco.com/ en/US/prod/collateral/iosswrel/ps6537/ps6554 /ps6599/ps10800/at-a-glance-c45- 645204.pdf.
  • 12
    • 84890489594 scopus 로고    scopus 로고
    • Defending against distributed denial of service attack under tunnel based forwarding
    • Thesis, Aalto University, Aug
    • ]. F. K. Ghalati, "Defending Against Distributed Denial of Service Attack Under Tunnel based Forwarding," Master Thesis, Aalto University, Aug. 2011.
    • (2011) Master
    • Ghalati, F.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.