메뉴 건너뛰기




Volumn , Issue , 2013, Pages 630-638

Poseidon: Mitigating interest flooding DDoS attacks in named data networking

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURE; FLOODS; INTERNET; NETWORK ARCHITECTURE; NETWORK SECURITY;

EID: 84898024191     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2013.6761300     Document Type: Conference Paper
Times cited : (183)

References (34)
  • 5
    • 84898045887 scopus 로고    scopus 로고
    • CCNx protocol. http://www.ccnx.org/releases/latest/doc/technical/ CCNxProtocol.html.
    • CCNx protocol
  • 7
  • 8
    • 85042138552 scopus 로고    scopus 로고
    • Poster: Ndn interest flooding attacks and countermeasures
    • A. Compagno, M. Conti, P. Gasti, and G. Tsudik. POSTER: NDN interest flooding attacks and countermeasures. In ACSAC, 2012.
    • (2012) ACSAC
    • Compagno, A.1    Conti, M.2    Gasti, P.3    Tsudik, G.4
  • 9
    • 84886396936 scopus 로고    scopus 로고
    • A lightweight mechanism for detection of cache pollution attacks in named data networking
    • M. Conti, P. Gasti, and M. Teoli. A lightweight mechanism for detection of cache pollution attacks in named data networking. Journal on Computer Networks (COMNET), 2013.
    • (2013) Journal on Computer Networks (COMNET
    • Conti, M.1    Gasti, P.2    Teoli, M.3
  • 10
    • 84964056533 scopus 로고    scopus 로고
    • Mitigate ddos attacks in ndn by interest traceback
    • H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate ddos attacks in ndn by interest traceback. In NOMEN, 2013.
    • (2013) NOMEN
    • Dai, H.1    Wang, Y.2    Fan, J.3    Liu, B.4
  • 11
    • 84898026745 scopus 로고    scopus 로고
    • NS3 DCE CCNx
    • NS3 DCE CCNx. http://www-sop.inria.fr/members/Frederic.Urbani/ns3dceccnx/ getting-started.html.
  • 14
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • C. Gkantsidis and P. Rodriguez. Cooperative security for network coding file distribution. In INFOCOM, 2006.
    • (2006) INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 16
    • 85180745018 scopus 로고    scopus 로고
    • Bellovin. Implementing pushback: Router-based defense against ddos attacks
    • J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against ddos attacks. In NDSS, 2002.
    • (2002) NDSS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 20
    • 77954503385 scopus 로고    scopus 로고
    • Greening the internet with content-centric networking
    • U. Lee, I. Rimac, and V. Hilt. Greening the internet with content-centric networking. In e-Energy, pages 179-182, 2010.
    • (2010) E-Energy , pp. 179-182
    • Lee, U.1    Rimac, I.2    Hilt, V.3
  • 21
    • 77952377075 scopus 로고    scopus 로고
    • A general model of probabilistic packet marking for ip traceback
    • L. Lu, M. C. Chan, and E.-C. Chang. A general model of probabilistic packet marking for ip traceback. In ASIACCS, pages 179-188, 2008.
    • (2008) ASIACCS , pp. 179-188
    • Lu, L.1    Chan, M.C.2    Chang, E.-C.3
  • 24
    • 84898044923 scopus 로고    scopus 로고
    • Nebula. http://nebula.cis.upenn.edu.
    • Nebula
  • 25
    • 84898034839 scopus 로고    scopus 로고
    • NS-3. http://www.nsnam.org.
    • NS-3
  • 26
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • DOI 10.1145/505659.505664
    • V. Paxson. An analysis of using reflectors for distributed denial-ofservice attacks. ACM SIGCOMM CCR, 31(3):38-47, 2001. (Pubitemid 33586487)
    • (2001) Computer Communication Review , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 27
    • 71949122821 scopus 로고    scopus 로고
    • Perils of transitive trust in the domain name system
    • V. Ramasubramanian and E. Sirer. Perils of transitive trust in the domain name system. In IMC, 2005.
    • IMC , pp. 2005
    • Ramasubramanian, V.1    Sirer, E.2
  • 28
    • 77953310217 scopus 로고    scopus 로고
    • Approximate models for general cache networks
    • E. J. Rosensweig, J. Kurose, and D. Towsley. Approximate models for general cache networks. In INFOCOM, pages 1100-1108, 2010.
    • (2010) INFOCOM , pp. 1100-1108
    • Rosensweig, E.J.1    Kurose, J.2    Towsley, D.3
  • 29
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An ip overlay network for tracking dos floods
    • R. Stone. Centertrack: An ip overlay network for tracking dos floods. USENIX SSYM, pages 15-15, 2000.
    • (2000) USENIX SSYM , pp. 15-15
    • Stone, R.1
  • 30
    • 24344471722 scopus 로고    scopus 로고
    • A practical method to counteract denial of service attacks
    • U. Tupakula and V. Varadharajan. A practical method to counteract denial of service attacks. In ACSC, pages 275-284, 2003.
    • (2003) ACSC , pp. 275-284
    • Tupakula, U.1    Varadharajan, V.2
  • 31
    • 84898038727 scopus 로고    scopus 로고
    • Backscatter from the data plane- threats to stability and security in information-centric networking
    • abs/1205.4778
    • M. Wahlisch, T. C. Schmidt, and M. Vahlenkamp. Backscatter from the data plane- threats to stability and security in information-centric networking. CoRR, abs/1205.4778, 2012.
    • (2012) CoRR
    • Wahlisch, M.1    Schmidt, T.C.2    Vahlenkamp, M.3
  • 32
    • 0036343692 scopus 로고    scopus 로고
    • Shin. Detecting syn flooding attacks
    • H. Wang, D. Zhang, and K. G. Shin. Detecting syn flooding attacks. In INFOCOM, pages 1530-1539, 2002.
    • (2002) INFOCOM , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 34
    • 84861616701 scopus 로고    scopus 로고
    • Enhancing cache robustness for content-centric networks
    • M. Xie, I. Widjaja, and H. Wang. Enhancing cache robustness for content-centric networks. In INFOCOM, 2012.
    • (2012) INFOCOM
    • Xie, M.1    Widjaja, I.2    Wang, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.