-
1
-
-
79960199820
-
Networking named content
-
V. Jacobson et al., "Networking named content, " in Proc. of CoNEXT, 2009.
-
(2009)
Proc. of CoNEXT
-
-
Jacobson, V.1
-
2
-
-
80052504558
-
Named data networking (NDN) project
-
October
-
L. Zhang et al., "Named data networking (NDN) project, " NDN Project, Tech. Rep. NDN-0001, October 2010.
-
(2010)
NDN Project, Tech. Rep. NDN-0001
-
-
Zhang, L.1
-
3
-
-
84890813900
-
-
Arbor networks, "Worldwide infrastructure security report, " http://www.arbornetworks.com/research/infrastructure-security-report, Volume VII, 2011.
-
(2011)
Worldwide Infrastructure Security Report
, vol.7
-
-
-
4
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms, " CCR, vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
CCR
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
5
-
-
84872940453
-
Adaptive forwarding in named data networking
-
July
-
C. Yi, A. Afanasyev, L. Wang, B. Zhang, and L. Zhang, "Adaptive forwarding in named data networking, " CCR, vol. 42, no. 3, pp. 62-67, July 2012.
-
(2012)
CCR
, vol.42
, Issue.3
, pp. 62-67
-
-
Yi, C.1
Afanasyev, A.2
Wang, L.3
Zhang, B.4
Zhang, L.5
-
6
-
-
84875699331
-
A case for stateful forwarding plane
-
C. Yi, A. Afanasyev, I. Moiseenko, L. Wang, B. Zhang, and L. Zhang, "A case for stateful forwarding plane, " Computer Communications: Information-Centric Networking, Special Issue, 2013.
-
(2013)
Computer Communications: Information-Centric Networking
-
-
Yi, C.1
Afanasyev, A.2
Moiseenko, I.3
Wang, L.4
Zhang, B.5
Zhang, L.6
-
7
-
-
77955460661
-
Host-to-host congestion control for TCP
-
July
-
A. Afanasyev, N. Tilley, P. Reiher, and L. Kleinrock, "Host-to-host congestion control for TCP, " IEEE Comm. Surveys and Tutorials, vol. 12, no. 3, July 2010.
-
(2010)
IEEE Comm. Surveys and Tutorials
, vol.12
, Issue.3
-
-
Afanasyev, A.1
Tilley, N.2
Reiher, P.3
Kleinrock, L.4
-
8
-
-
0029356674
-
Link-sharing and resource management models for packet networks
-
S. Floyd and V. Jacobson, "Link-sharing and resource management models for packet networks, " IEEE/ACM Transactions on Networking, vol. 3, no. 4, pp. 365-386, 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.4
, pp. 365-386
-
-
Floyd, S.1
Jacobson, V.2
-
9
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks, " in Proc. of NDSS Symposium, 2002.
-
(2002)
Proc. of NDSS Symposium
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
10
-
-
84875707930
-
NdnSIM: NDN simulator for NS-3
-
A. Afanasyev, I. Moiseenko, and L. Zhang, "ndnSIM: NDN simulator for NS-3, " NDN Project, Tech. Rep. NDN-0005, 2012.
-
(2012)
NDN Project, Tech. Rep. NDN-0005
-
-
Afanasyev, A.1
Moiseenko, I.2
Zhang, L.3
-
11
-
-
13944259535
-
Measuring ISP topologies with rocket fuel
-
N. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP topologies with rocketfuel, " CCR, vol. 32, no. 4, pp. 133-145, 2002.
-
(2002)
CCR
, vol.32
, Issue.4
, pp. 133-145
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
-
14
-
-
84875729287
-
-
arXiv preprint arXiv:1208.0952
-
P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, "DoS & DDoS in Named- Data Networking, " arXiv preprint arXiv:1208.0952, 2012.
-
(2012)
DoS & DDoS in Named- Data Networking
-
-
Gasti, P.1
Tsudik, G.2
Uzun, E.3
Zhang, L.4
-
15
-
-
84883669157
-
A case for stateful forwarding plane
-
C. Yi, A. Afanasyev, I. Moiseenko, L. Wang, B. Zhang, and L. Zhang, "A case for stateful forwarding plane, " NDN, Tech. Rep. NDN-0002, 2012.
-
(2012)
NDN Tech. Rep. NDN-0002
-
-
Yi, C.1
Afanasyev, A.2
Moiseenko, I.3
Wang, L.4
Zhang, B.5
Zhang, L.6
-
16
-
-
84862068488
-
An effective hop-by-hop interest shaping mechanism for CCN communications
-
N. Rozhnova and S. Fdida, "An effective hop-by-hop interest shaping mechanism for CCN communications, " in Proc. of INFOCOM WKSHPS, 2012, pp. 322-327.
-
(2012)
Proc. of INFOCOM WKSHPS
, pp. 322-327
-
-
Rozhnova, N.1
Fdida, S.2
-
17
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
Y. Chen, K. Hwang, and W. Ku, "Collaborative detection of DDoS attacks over multiple network domains, " IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.3
-
18
-
-
84863260902
-
DDoS flooding attack detection through a step-by-step investigation
-
J. Jun, H. Oh, and S. Kim, "DDoS flooding attack detection through a step-by-step investigation, " in Proc. of NESEA, 2011.
-
(2011)
Proc. of NESEA
-
-
Jun, J.1
Oh, H.2
Kim, S.3
-
20
-
-
85050149881
-
Active internet traffic filtering: Real-time response to denial-of-service attacks
-
K. Argyraki and D. Cheriton, "Active internet traffic filtering: Real-time response to denial-of-service attacks, " USENIX, 2005.
-
(2005)
USENIX
-
-
Argyraki, K.1
Cheriton, D.2
-
21
-
-
34648867936
-
A framework for a collaborative DDoS defense
-
G. Oikonomou, J. Mirkovic, P. Reiher, and M. Robinson, "A framework for a collaborative DDoS defense, " in Proc. of ACSAC, 2006.
-
(2006)
Proc. of ACSAC
-
-
Oikonomou, G.1
Mirkovic, J.2
Reiher, P.3
Robinson, M.4
-
22
-
-
65249149520
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Network-layer DoS defense against multimillion-node botnets, " in CCR, vol. 38, no. 4, 2008, pp. 195-206.
-
(2008)
CCR
, vol.38
, Issue.4
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
23
-
-
72449130431
-
Proactive surge protection: A defense mechanism for bandwidth-based attacks
-
J. Chou, B. Lin, S. Sen, and O. Spatscheck, "Proactive surge protection: A defense mechanism for bandwidth-based attacks, " IEEE/ACM Transactions on Networking, vol. 17, no. 6, pp. 1711-1723, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.6
, pp. 1711-1723
-
-
Chou, J.1
Lin, B.2
Sen, S.3
Spatscheck, O.4
-
24
-
-
78149316527
-
Netfence: Preventing internet denial of service from inside out
-
X. Liu, X. Yang, and Y. Xia, "Netfence: preventing internet denial of service from inside out, " in Proc. of SIGCOMM, 2010.
-
(2010)
Proc. of SIGCOMM
-
-
Liu, X.1
Yang, X.2
Xia, Y.3
-
25
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
R. Stone, "CenterTrack: An IP overlay network for tracking DoS floods, " in Proc. of USENIX Security Symposium, vol. 9, 2000, pp. 199-212.
-
(2000)
Proc. of USENIX Security Symposium
, vol.9
, pp. 199-212
-
-
Stone, R.1
-
26
-
-
0742269306
-
SOS: An architecture for mitigating DDoS attacks
-
A. Keromytis, V. Misra, and D. Rubenstein, "SOS: An architecture for mitigating DDoS attacks, " IEEE Journal on Selected Areas in Communications, vol. 22, no. 1, pp. 176-188, 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 176-188
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
29
-
-
33750308365
-
A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting network architecture, " CCR, vol. 35, no. 4, pp. 241-252, 2005.
-
(2005)
CCR
, vol.35
, Issue.4
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
31
-
-
77954321139
-
Fine-grained capabilities for flooding DDoS defense using client reputations
-
M. Natu and J. Mirkovic, "Fine-grained capabilities for flooding DDoS defense using client reputations, " in Proce. of LSAD, 2007.
-
(2007)
Proce. of LSAD
-
-
Natu, M.1
Mirkovic, J.2
-
32
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
B. Parno, A. Perrig, D. Wendlandt, B. Maggs, E. Shi, and Y. chun Hu, "Portcullis: Protecting connection setup from denial-of-capability attacks, " in Proc. of the SIGCOMM, 2007.
-
(2007)
Proc. of the SIGCOMM
-
-
Parno, B.1
Perrig, A.2
Wendlandt, D.3
Maggs, B.4
Shi, E.5
Hu, Y.C.6
-
33
-
-
84890842459
-
Preventing internet denial-of-service with capabilities
-
T. Anderson, "Preventing internet denial-of-service with capabilities, " CCR, vol. 34, no. 1, p. 2004, 2003.
-
(2003)
CCR
, vol.34
, Issue.1
, pp. 2004
-
-
Anderson, T.1
-
35
-
-
33750310218
-
Using packet symmetry to curtail malicious traffic
-
C. Kreibich, A. Warfield, J. Crowcroft, S. Hand, and I. Pratt, "Using packet symmetry to curtail malicious traffic, " in Proc. of HotNets, 2005.
-
(2005)
Proc. of HotNets
-
-
Kreibich, C.1
Warfield, A.2
Crowcroft, J.3
Hand, S.4
Pratt, I.5
-
36
-
-
51349153757
-
DFence: Transparent network-based denial of service mitigation
-
A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang, "dFence: Transparent network-based denial of service mitigation, " in NSDI, 2007.
-
(2007)
NSDI
-
-
Mahimkar, A.1
Dange, J.2
Shmatikov, V.3
Vin, H.4
Zhang, Y.5
|