메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Interest flooding attack and countermeasures in named data networking

Author keywords

denial of service; Information centric networks; named data networking

Indexed keywords

DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; EFFECTIVE SOLUTION; FLOODING ATTACKS; INFORMATION-CENTRIC; NAMED DATA NETWORKINGS; NAMED-DATA NETWORKING; PROPOSED FUTURE INTERNETS;

EID: 84890852576     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (235)

References (36)
  • 1
    • 79960199820 scopus 로고    scopus 로고
    • Networking named content
    • V. Jacobson et al., "Networking named content, " in Proc. of CoNEXT, 2009.
    • (2009) Proc. of CoNEXT
    • Jacobson, V.1
  • 2
  • 3
    • 84890813900 scopus 로고    scopus 로고
    • Arbor networks, "Worldwide infrastructure security report, " http://www.arbornetworks.com/research/infrastructure-security-report, Volume VII, 2011.
    • (2011) Worldwide Infrastructure Security Report , vol.7
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms, " CCR, vol. 34, no. 2, pp. 39-53, 2004.
    • (2004) CCR , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 5
    • 84872940453 scopus 로고    scopus 로고
    • Adaptive forwarding in named data networking
    • July
    • C. Yi, A. Afanasyev, L. Wang, B. Zhang, and L. Zhang, "Adaptive forwarding in named data networking, " CCR, vol. 42, no. 3, pp. 62-67, July 2012.
    • (2012) CCR , vol.42 , Issue.3 , pp. 62-67
    • Yi, C.1    Afanasyev, A.2    Wang, L.3    Zhang, B.4    Zhang, L.5
  • 8
    • 0029356674 scopus 로고
    • Link-sharing and resource management models for packet networks
    • S. Floyd and V. Jacobson, "Link-sharing and resource management models for packet networks, " IEEE/ACM Transactions on Networking, vol. 3, no. 4, pp. 365-386, 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.4 , pp. 365-386
    • Floyd, S.1    Jacobson, V.2
  • 9
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks, " in Proc. of NDSS Symposium, 2002.
    • (2002) Proc. of NDSS Symposium
    • Ioannidis, J.1    Bellovin, S.M.2
  • 11
    • 13944259535 scopus 로고    scopus 로고
    • Measuring ISP topologies with rocket fuel
    • N. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP topologies with rocketfuel, " CCR, vol. 32, no. 4, pp. 133-145, 2002.
    • (2002) CCR , vol.32 , Issue.4 , pp. 133-145
    • Spring, N.1    Mahajan, R.2    Wetherall, D.3
  • 16
    • 84862068488 scopus 로고    scopus 로고
    • An effective hop-by-hop interest shaping mechanism for CCN communications
    • N. Rozhnova and S. Fdida, "An effective hop-by-hop interest shaping mechanism for CCN communications, " in Proc. of INFOCOM WKSHPS, 2012, pp. 322-327.
    • (2012) Proc. of INFOCOM WKSHPS , pp. 322-327
    • Rozhnova, N.1    Fdida, S.2
  • 17
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • Y. Chen, K. Hwang, and W. Ku, "Collaborative detection of DDoS attacks over multiple network domains, " IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, 2007.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.3
  • 18
    • 84863260902 scopus 로고    scopus 로고
    • DDoS flooding attack detection through a step-by-step investigation
    • J. Jun, H. Oh, and S. Kim, "DDoS flooding attack detection through a step-by-step investigation, " in Proc. of NESEA, 2011.
    • (2011) Proc. of NESEA
    • Jun, J.1    Oh, H.2    Kim, S.3
  • 20
    • 85050149881 scopus 로고    scopus 로고
    • Active internet traffic filtering: Real-time response to denial-of-service attacks
    • K. Argyraki and D. Cheriton, "Active internet traffic filtering: Real-time response to denial-of-service attacks, " USENIX, 2005.
    • (2005) USENIX
    • Argyraki, K.1    Cheriton, D.2
  • 22
    • 65249149520 scopus 로고    scopus 로고
    • To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
    • X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Network-layer DoS defense against multimillion-node botnets, " in CCR, vol. 38, no. 4, 2008, pp. 195-206.
    • (2008) CCR , vol.38 , Issue.4 , pp. 195-206
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 23
    • 72449130431 scopus 로고    scopus 로고
    • Proactive surge protection: A defense mechanism for bandwidth-based attacks
    • J. Chou, B. Lin, S. Sen, and O. Spatscheck, "Proactive surge protection: A defense mechanism for bandwidth-based attacks, " IEEE/ACM Transactions on Networking, vol. 17, no. 6, pp. 1711-1723, 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.6 , pp. 1711-1723
    • Chou, J.1    Lin, B.2    Sen, S.3    Spatscheck, O.4
  • 24
    • 78149316527 scopus 로고    scopus 로고
    • Netfence: Preventing internet denial of service from inside out
    • X. Liu, X. Yang, and Y. Xia, "Netfence: preventing internet denial of service from inside out, " in Proc. of SIGCOMM, 2010.
    • (2010) Proc. of SIGCOMM
    • Liu, X.1    Yang, X.2    Xia, Y.3
  • 25
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • R. Stone, "CenterTrack: An IP overlay network for tracking DoS floods, " in Proc. of USENIX Security Symposium, vol. 9, 2000, pp. 199-212.
    • (2000) Proc. of USENIX Security Symposium , vol.9 , pp. 199-212
    • Stone, R.1
  • 27
  • 29
    • 33750308365 scopus 로고    scopus 로고
    • A DoS-limiting network architecture
    • X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting network architecture, " CCR, vol. 35, no. 4, pp. 241-252, 2005.
    • (2005) CCR , vol.35 , Issue.4 , pp. 241-252
    • Yang, X.1    Wetherall, D.2    Anderson, T.3
  • 31
    • 77954321139 scopus 로고    scopus 로고
    • Fine-grained capabilities for flooding DDoS defense using client reputations
    • M. Natu and J. Mirkovic, "Fine-grained capabilities for flooding DDoS defense using client reputations, " in Proce. of LSAD, 2007.
    • (2007) Proce. of LSAD
    • Natu, M.1    Mirkovic, J.2
  • 33
    • 84890842459 scopus 로고    scopus 로고
    • Preventing internet denial-of-service with capabilities
    • T. Anderson, "Preventing internet denial-of-service with capabilities, " CCR, vol. 34, no. 1, p. 2004, 2003.
    • (2003) CCR , vol.34 , Issue.1 , pp. 2004
    • Anderson, T.1
  • 36
    • 51349153757 scopus 로고    scopus 로고
    • DFence: Transparent network-based denial of service mitigation
    • A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang, "dFence: Transparent network-based denial of service mitigation, " in NSDI, 2007.
    • (2007) NSDI
    • Mahimkar, A.1    Dange, J.2    Shmatikov, V.3    Vin, H.4    Zhang, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.