-
1
-
-
84890852576
-
Interest flooding attack and countermeasures in named data networking
-
A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang. Interest flooding attack and countermeasures in Named Data Networking. In IFIP Networking, 2013.
-
(2013)
IFIP Networking
-
-
Afanasyev, A.1
Mahadevan, P.2
Moiseenko, I.3
Uzun, E.4
Zhang, L.5
-
2
-
-
84875707930
-
-
University of California, Los Angeles, Jun 2012
-
A. Afanasyev, I. Moiseenko, and L. Zhang. ndnSIM: NDN simulator for NS-3. Technical Report NDN-0005, 2012, University of California, Los Angeles, Jun 2012.
-
(2012)
NdnSIM: NDN simulator for NS-3. Technical Report NDN-0005
-
-
Afanasyev, A.1
Moiseenko, I.2
Zhang, L.3
-
3
-
-
31544436627
-
Denial-of-service attackdetection techniques
-
jan
-
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai. Denial-of-service attackdetection techniques. IEEE Internet Computing, 10(1):82-89, jan 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
5
-
-
84898045887
-
-
CCNx protocol. http://www.ccnx.org/releases/latest/doc/technical/ CCNxProtocol.html.
-
CCNx protocol
-
-
-
6
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
DOI 10.1109/TPDS.2007.1111
-
Y. Chen, K. Hwang, and W.-S. Ku. Collaborative detection of ddos attacks over multiple network domains. IEEE TPDS, 18(12):1649-1662, 2007. (Pubitemid 350142414)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
7
-
-
84898048890
-
-
Retrieved Jul
-
ChoiceNet-Evolution through Choice. https://code.renci.org/gf/project/ choicenet/. Retrieved Jul. 2012.
-
(2012)
ChoiceNet-Evolution through Choice
-
-
-
8
-
-
85042138552
-
Poster: Ndn interest flooding attacks and countermeasures
-
A. Compagno, M. Conti, P. Gasti, and G. Tsudik. POSTER: NDN interest flooding attacks and countermeasures. In ACSAC, 2012.
-
(2012)
ACSAC
-
-
Compagno, A.1
Conti, M.2
Gasti, P.3
Tsudik, G.4
-
9
-
-
84886396936
-
A lightweight mechanism for detection of cache pollution attacks in named data networking
-
M. Conti, P. Gasti, and M. Teoli. A lightweight mechanism for detection of cache pollution attacks in named data networking. Journal on Computer Networks (COMNET), 2013.
-
(2013)
Journal on Computer Networks (COMNET
-
-
Conti, M.1
Gasti, P.2
Teoli, M.3
-
10
-
-
84964056533
-
Mitigate ddos attacks in ndn by interest traceback
-
H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate ddos attacks in ndn by interest traceback. In NOMEN, 2013.
-
(2013)
NOMEN
-
-
Dai, H.1
Wang, Y.2
Fan, J.3
Liu, B.4
-
11
-
-
84898026745
-
-
NS3 DCE CCNx
-
NS3 DCE CCNx. http://www-sop.inria.fr/members/Frederic.Urbani/ns3dceccnx/ getting-started.html.
-
-
-
-
13
-
-
84875729287
-
-
Technical Report University of California, Irvine
-
P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS and DDoS in named-data networking. Technical report, University of California, Irvine, 2012.
-
(2012)
DoS and DDoS In Named-data Networking
-
-
Gasti, P.1
Tsudik, G.2
Uzun, E.3
Zhang, L.4
-
14
-
-
39049090594
-
Cooperative security for network coding file distribution
-
C. Gkantsidis and P. Rodriguez. Cooperative security for network coding file distribution. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
15
-
-
77953108919
-
On realistic network topologies for simulation
-
O. Heckmann, M. Piringer, J. Schmitt, and R. Steinmetz. On realistic network topologies for simulation. In ACM MoMeTools, pages 28-32, 2003.
-
(2003)
ACM MoMeTools
, pp. 28-32
-
-
Heckmann, O.1
Piringer, M.2
Schmitt, J.3
Steinmetz, R.4
-
16
-
-
85180745018
-
Bellovin. Implementing pushback: Router-based defense against ddos attacks
-
J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against ddos attacks. In NDSS, 2002.
-
(2002)
NDSS
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
18
-
-
76749132819
-
Voccn: Voice-over content centric networks
-
V. Jacobson, D. Smetters, N. Briggs, M. Plass, J. Thornton, and R. Braynard. Voccn: Voice-over content centric networks. In ReArch, 2009.
-
(2009)
ReArch
-
-
Jacobson, V.1
Smetters, D.2
Briggs, N.3
Plass, M.4
Thornton, J.5
Braynard, R.6
-
20
-
-
77954503385
-
Greening the internet with content-centric networking
-
U. Lee, I. Rimac, and V. Hilt. Greening the internet with content-centric networking. In e-Energy, pages 179-182, 2010.
-
(2010)
E-Energy
, pp. 179-182
-
-
Lee, U.1
Rimac, I.2
Hilt, V.3
-
21
-
-
77952377075
-
A general model of probabilistic packet marking for ip traceback
-
L. Lu, M. C. Chan, and E.-C. Chang. A general model of probabilistic packet marking for ip traceback. In ASIACCS, pages 179-188, 2008.
-
(2008)
ASIACCS
, pp. 179-188
-
-
Lu, L.1
Chan, M.C.2
Chang, E.-C.3
-
24
-
-
84898044923
-
-
Nebula. http://nebula.cis.upenn.edu.
-
Nebula
-
-
-
25
-
-
84898034839
-
-
NS-3. http://www.nsnam.org.
-
NS-3
-
-
-
26
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
DOI 10.1145/505659.505664
-
V. Paxson. An analysis of using reflectors for distributed denial-ofservice attacks. ACM SIGCOMM CCR, 31(3):38-47, 2001. (Pubitemid 33586487)
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
27
-
-
71949122821
-
Perils of transitive trust in the domain name system
-
V. Ramasubramanian and E. Sirer. Perils of transitive trust in the domain name system. In IMC, 2005.
-
IMC
, pp. 2005
-
-
Ramasubramanian, V.1
Sirer, E.2
-
28
-
-
77953310217
-
Approximate models for general cache networks
-
E. J. Rosensweig, J. Kurose, and D. Towsley. Approximate models for general cache networks. In INFOCOM, pages 1100-1108, 2010.
-
(2010)
INFOCOM
, pp. 1100-1108
-
-
Rosensweig, E.J.1
Kurose, J.2
Towsley, D.3
-
29
-
-
85084163540
-
Centertrack: An ip overlay network for tracking dos floods
-
R. Stone. Centertrack: An ip overlay network for tracking dos floods. USENIX SSYM, pages 15-15, 2000.
-
(2000)
USENIX SSYM
, pp. 15-15
-
-
Stone, R.1
-
30
-
-
24344471722
-
A practical method to counteract denial of service attacks
-
U. Tupakula and V. Varadharajan. A practical method to counteract denial of service attacks. In ACSC, pages 275-284, 2003.
-
(2003)
ACSC
, pp. 275-284
-
-
Tupakula, U.1
Varadharajan, V.2
-
31
-
-
84898038727
-
Backscatter from the data plane- threats to stability and security in information-centric networking
-
abs/1205.4778
-
M. Wahlisch, T. C. Schmidt, and M. Vahlenkamp. Backscatter from the data plane- threats to stability and security in information-centric networking. CoRR, abs/1205.4778, 2012.
-
(2012)
CoRR
-
-
Wahlisch, M.1
Schmidt, T.C.2
Vahlenkamp, M.3
-
32
-
-
0036343692
-
Shin. Detecting syn flooding attacks
-
H. Wang, D. Zhang, and K. G. Shin. Detecting syn flooding attacks. In INFOCOM, pages 1530-1539, 2002.
-
(2002)
INFOCOM
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
34
-
-
84861616701
-
Enhancing cache robustness for content-centric networks
-
M. Xie, I. Widjaja, and H. Wang. Enhancing cache robustness for content-centric networks. In INFOCOM, 2012.
-
(2012)
INFOCOM
-
-
Xie, M.1
Widjaja, I.2
Wang, H.3
|