메뉴 건너뛰기




Volumn 9, Issue 3, 2014, Pages 436-450

Toward incentivizing anti-spoofing deployment

Author keywords

deployment incentive; DoS defense; IP spoofing; spoofing prevention

Indexed keywords

ACCESS CONTROL LISTS; ANALYSIS AND SIMULATION; AUTONOMOUS SYSTEMS; COMPRESSION ALGORITHMS; DEPLOYMENT INCENTIVE; EVALUATION RESULTS; IP SPOOFING; SPOOFING PREVENTION;

EID: 84896839864     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2296437     Document Type: Article
Times cited : (77)

References (37)
  • 4
    • 84896884316 scopus 로고    scopus 로고
    • Sep. 1 [Online]
    • (2013, Sep. 1). Spoofer Project [Online]. Available: http://spoofer. cmand.org/index.php
    • (2013) Spoofer Project
  • 5
    • 84877726988 scopus 로고    scopus 로고
    • Understanding the efficacy of deployed internet source address validation filtering
    • R. Beverly, A. Berger, Y. Hyun, and K. Claffy, "Understanding the efficacy of deployed internet source address validation filtering, " in Proc. IMC, 2009, pp. 356-369.
    • (2009) Proc. IMC , pp. 356-369
    • Beverly, R.1    Berger, A.2    Hyun, Y.3    Claffy, K.4
  • 6
    • 84896900231 scopus 로고    scopus 로고
    • Jan (Re: Isprime DOS in Progress)
    • F. Bulk. (2009, Jan.). Are We Really This Helpless? (Re: Isprime DOS in Progress) http://mailman.nanog.org/pipermail/nanog/2009-January/006996.html
    • (2009) Are We Really This Helpless?
    • Bulk, F.1
  • 9
    • 84055179063 scopus 로고    scopus 로고
    • A deployable approach for inter-As anti-spoofing
    • Oct.
    • B. Liu, J. Bi, and Y. Zhu, "A deployable approach for inter-As anti-spoofing, " in Proc. 19th IEEE ICNP, Oct. 2011, pp. 19-24.
    • (2011) Proc. 19th IEEE ICNP , pp. 19-24
    • Liu, B.1    Bi, J.2    Zhu, Y.3
  • 11
    • 78751666107 scopus 로고    scopus 로고
    • Comparative evaluation of spoofing defenses
    • Mar./Apr.
    • J. Mirkovic and E. Kissel, "Comparative evaluation of spoofing defenses, " IEEE Trans. Depend. Secure Comput., vol. 8, no. 2, pp. 218-232, Mar./Apr. 2011.
    • (2011) IEEE Trans. Depend. Secure Comput. , vol.8 , Issue.2 , pp. 218-232
    • Mirkovic, J.1    Kissel, E.2
  • 12
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
    • DOI 10.1145/964723.383061
    • K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, " in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., Oct. 2001, pp. 15-26. (Pubitemid 32981951)
    • (2001) Computer Communication Review , vol.31 , Issue.4 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 13
    • 25844486083 scopus 로고    scopus 로고
    • Spoofing prevention method
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • A. Bremler-Barr and H. Levy, "Spoofing prevention method, " in Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc., vol. 1. Mar. 2005, pp. 536-547. (Pubitemid 41390849)
    • (2005) Proceedings - IEEE INFOCOM , vol.1 , pp. 536-547
    • Bremler-Barr, A.1    Levy, H.2
  • 14
    • 39049160574 scopus 로고    scopus 로고
    • Constructing inter-domain packet filters to control IP spoofing based on BGP updates
    • Z. Duan, X. Yuan, and J. Chandrashekar, "Constructing inter-domain packet filters to control IP spoofing based on BGP updates, " in Proc. INFOCOM, 2006, pp. 1-12.
    • (2006) Proc. INFOCOM , pp. 1-12
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 15
    • 0036349004 scopus 로고    scopus 로고
    • SAVE: Source address validity enforcement protocol
    • J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, "SAVE: Source address validity enforcement protocol, " in Proc. INFOCOM, 2002, pp. 1557-1566.
    • (2002) Proc. INFOCOM , pp. 1557-1566
    • Li, J.1    Mirkovic, J.2    Wang, M.3    Reiher, P.4    Zhang, L.5
  • 16
    • 33749831619 scopus 로고    scopus 로고
    • StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense
    • DOI 10.1109/JSAC.2006.877138, 1705617
    • A. Yaar, A. Perrig, and D. Song, "StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense, " IEEE J. Sel. Areas Commun., vol. 24, no. 10, pp. 1853-1863, Oct. 2006. (Pubitemid 44559599)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1853-1863
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 18
    • 84896831789 scopus 로고    scopus 로고
    • Aug. 30 [Online]
    • (2013, Aug. 30). RIPE IP Anti-Spoofing Task Force [Online]. Available: http://www.ripe.net/ripe/groups/tf/anti-spoofing
    • (2013) RIPE IP Anti-Spoofing Task Force
  • 19
    • 84896886180 scopus 로고    scopus 로고
    • [Online]
    • (2012). BCP38 Deployment[Online].Available:http://mailman.nanog.org/ pipermail/nanog/2012-March/047093.html
    • (2012) BCP38 Deployment
  • 20
    • 84896886180 scopus 로고    scopus 로고
    • [Online]
    • (2012). BCP38 Deployment [Online]. Available: http://mailman.nanog. org/pipermail/nanog/2012-March/047087.html
    • (2012) BCP38 Deployment
  • 22
    • 84894530492 scopus 로고    scopus 로고
    • FaaS: Filtering IP spoofing traffic as a service
    • Oct.
    • B. Liu, J. Bi, and X. Yang, "FaaS: Filtering IP spoofing traffic as a service, " ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 4, pp. 113-114, Oct. 2012.
    • (2012) ACM SIGCOMM Comput. Commun. Rev. , vol.42 , Issue.4 , pp. 113-114
    • Liu, B.1    Bi, J.2    Yang, X.3
  • 24
    • 84896815253 scopus 로고    scopus 로고
    • Dec. 1
    • (2013, Dec. 1). Number Resources [Online]. Available: http://www.iana.org/numbers
    • (2013) Number Resources [Online]
  • 25
    • 1842432047 scopus 로고    scopus 로고
    • An analysis of update ordering in distributed replication systems
    • W. Zhou, L. Wang, and W. Jia, "An analysis of update ordering in distributed replication systems, " Future Generat. Comput. Syst., vol. 20, no. 4, pp. 565-590, 2004.
    • (2004) Future Generat. Comput. Syst. , vol.20 , Issue.4 , pp. 565-590
    • Zhou, W.1    Wang, L.2    Jia, W.3
  • 26
    • 0023833640 scopus 로고
    • Timestamps in message-passing systems that preserve the partial ordering
    • C. J. Fidge, "Timestamps in message-passing systems that preserve the partial ordering, " in Proc. 11th Austral. Comput. Sci. Conf., vol. 10. 1988, no. 1, pp. 56-66.
    • (1988) Proc. 11th Austral. Comput. Sci. Conf. , vol.10 , Issue.1 , pp. 56-66
    • Fidge, C.J.1
  • 28
    • 84896875682 scopus 로고    scopus 로고
    • Dec. 1 [Online]
    • (2013, Dec. 1). Configuring IP Access Lists [Online]. Available: http://www.cisco.com/en/US/products/sw/secursw/ps1018/products-tech- note09186a00800a5b9a.shtml
    • (2013) Configuring IP Access Lists
  • 29
    • 84859991654 scopus 로고    scopus 로고
    • Optimal source-based filtering of malicious traffic
    • Apr.
    • F. Soldo, K. Argyraki, and A. Markopoulou, "Optimal source-based filtering of malicious traffic, " IEEE/ACM Trans. Netw., vol. 20, no. 2, pp. 381-395, Apr. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.2 , pp. 381-395
    • Soldo, F.1    Argyraki, K.2    Markopoulou, A.3
  • 30
    • 84896813314 scopus 로고    scopus 로고
    • Oct. 11 [Online]
    • (2012, Oct. 11). Routeviews Prefix to AS Mappings [Online]. Available: http://data.caida.org/datasets/routing/routeviews-prefix2as/
    • (2012) Routeviews Prefix to AS Mappings
  • 31
    • 84896844857 scopus 로고    scopus 로고
    • Oct. 11 [Online]
    • (2012, Oct. 11). Internet Topology Collection [Online]. Available: http://irl.cs.ucla.edu/topology
    • (2012) Internet Topology Collection
  • 32
    • 84896865537 scopus 로고    scopus 로고
    • Oct. 12 [Online]
    • B. Quoitin. (2012, Oct. 12). C-BGP [Online]. Available: http://c-bgp.sourceforge.net
    • (2012) C-BGP
    • Quoitin, B.1
  • 34
    • 77957595181 scopus 로고    scopus 로고
    • Dec. 4 [Online]
    • (2013, Dec. 4). Cidr Report [Online]. Available: http://www.cidr-report. org/as2.0/
    • (2013) Cidr Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.