메뉴 건너뛰기




Volumn 22, Issue 4, 2014, Pages 1218-1231

DFL: Secure and practical fault localization for datacenter networks

Author keywords

Datacenter network; delayed function disclosure; fault localization

Indexed keywords

ELECTRICAL ENGINEERING; SOFTWARE ENGINEERING;

EID: 84907600349     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2013.2274662     Document Type: Article
Times cited : (23)

References (43)
  • 1
    • 84857843743 scopus 로고    scopus 로고
    • Wired [Online].Available
    • K. Zetter, "Cisco security hole a whopper, " Wired 2005 [Online].Available: Http://www.wired.com/politics/security/news/2005/07/68328
    • (2005) Cisco Security Hole A Whopper
    • Zetter, K.1
  • 2
    • 84855445451 scopus 로고    scopus 로고
    • [Online]. Available
    • T. Espiner, "Symantec warns of router compromise, " 2008 [Online]. Available: Http://news.cnet.com/Symantec-warns-ofrouter-compromise/ 2100-7349-3-6227502.html
    • (2008) Symantec Warns of Router Compromise
    • Espiner, T.1
  • 3
    • 84907600187 scopus 로고    scopus 로고
    • Online]. Available
    • The Internet2 observatory: Proposal process, " 2008 [Online]. Available: Http://www.internet2.edu/observatory/archive/proposal-process. html
    • (2008) The Internet2 Observatory: Proposal Process
  • 5
    • 0029719644 scopus 로고    scopus 로고
    • The space complexity of approximating the frequency moments
    • N. Alon, Y. Matias, andM. Szegedy, "The space complexity of approximating the frequency moments, " in Proc. STOC, 1996, pp. 20-29.
    • (1996) Proc. STOC , pp. 20-29
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 8
    • 84907599401 scopus 로고    scopus 로고
    • Verifiable network-performance measurements
    • Art.
    • K. Argyraki, P. Maniatis, and A. Singla, "Verifiable network-performance measurements, " in Proc. ACM CoNEXT, 2010, Art. no. 1.
    • (2010) Proc. ACM CoNEXT , Issue.1
    • Argyraki, K.1    Maniatis, P.2    Singla, A.3
  • 10
    • 39149117709 scopus 로고    scopus 로고
    • ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
    • Art. no.
    • B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks, " Trans. Inf. Syst. Security, vol. 10, no. 4, 2008, Art. no. 6.
    • (2008) Trans. Inf. Syst. Security , vol.10 , Issue.4 , pp. 6
    • Awerbuch, B.1    Curtmola, R.2    Holmer, D.3    Nita-Rotaru, C.4    Rubens, H.5
  • 11
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to Byzantine failures
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to Byzantine failures, " in Proc. ACM WiSE, 2002, pp. 21-30.
    • (2002) Proc. ACM WiSE , pp. 21-30
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 12
    • 44449117412 scopus 로고    scopus 로고
    • Protocols and lower bounds for failure localization in the Internet
    • B. Barak, S. Goldberg, and D. Xiao, "Protocols and lower bounds for failure localization in the Internet, " in Proc. EUROCRYPT, 2008, pp. 341-360.
    • (2008) Proc. EUROCRYPT , pp. 341-360
    • Barak, B.1    Goldberg, S.2    Xiao, D.3
  • 13
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 16
  • 17
    • 79960627456 scopus 로고    scopus 로고
    • Survey on routing in data centers: Insights and future directions
    • Jul.-Aug.
    • K. Chen, C. Hu, X. Zhang, K. Zheng, Y. Chen, and T. Vasilakos, "Survey on routing in data centers: Insights and future directions, " IEEE Netw., vol. 25, no. 4, pp. 6-10, Jul.-Aug. 2011.
    • (2011) IEEE Netw. , vol.25 , Issue.4 , pp. 6-10
    • Chen, K.1    Hu, C.2    Zhang, X.3    Zheng, K.4    Chen, Y.5    Vasilakos, T.6
  • 18
    • 79952915989 scopus 로고    scopus 로고
    • Measuring and characterizing end-To-end route dynamics in the presence of load balancing
    • I. Cunha, R. Teixeira, and C. Diot, "Measuring and characterizing end-To-end route dynamics in the presence of load balancing, " in Proc. PAM, 2011, pp. 235-244.
    • (2011) Proc. PAM , pp. 235-244
    • Cunha, I.1    Teixeira, R.2    Diot, C.3
  • 19
    • 0000891810 scopus 로고
    • Algorithm for solution of a problem of maximum flow in a network with power estimation
    • E. Dinic, "Algorithm for solution of a problem of maximum flow in a network with power estimation, " Soviet Math. Dokl, vol. 11, pp. 1277-1280, 1970.
    • (1970) Soviet Math. Dokl , vol.11 , pp. 1277-1280
    • Dinic, E.1
  • 23
    • 70450255244 scopus 로고    scopus 로고
    • BCube: A high performance, server-centric network architecture for modular data centers
    • C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu, "BCube: A high performance, server-centric network architecture for modular data centers, " in Proc. ACM Sigcomm, 2009, pp. 63-74.
    • (2009) Proc. ACM Sigcomm , pp. 63-74
    • Guo, C.1    Lu, G.2    Li, D.3    Wu, H.4    Zhang, X.5    Shi, Y.6    Tian, C.7    Zhang, Y.8    Lu, S.9
  • 24
    • 65249177665 scopus 로고    scopus 로고
    • Dcell: A scalable and fault-Tolerant network structure for data centers
    • C. Guo, H. Wu, K. Tan, L. Shiy, Y. Zhang, and S. Luz, "Dcell: A scalable and fault-Tolerant network structure for data centers, " in Proc. ACM Sigcomm, 2008, pp. 75-86.
    • (2008) Proc. ACM Sigcomm , pp. 75-86
    • Guo, C.1    Wu, H.2    Tan, K.3    Shiy, L.4    Zhang, Y.5    Luz, S.6
  • 25
    • 0033702951 scopus 로고    scopus 로고
    • Using conservation of flow as a security mechanism in network protocols
    • J. R. Hughes, T. Aura, and M. Bishop, "Using conservation of flow as a security mechanism in network protocols, " in Proc. IEEE Symp. Security Privacy, 2000, pp. 132-141.
    • (2000) Proc. IEEE Symp. Security Privacy , pp. 132-141
    • Hughes, J.R.1    Aura, T.2    Bishop, M.3
  • 28
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • May
    • K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs, " IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.5 , pp. 536-550
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 30
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, " in Proc. ACM MobiCom, 2000, pp. 255-265.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 35
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • V. N. Padmanabhan and D. R. Simon, "Secure traceroute to detect faulty or malicious routing, " Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
    • (2003) Comput. Commun. Rev. , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.N.1    Simon, D.R.2
  • 36
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canetti, D. Song, and D. Tygar, "The TESLA broadcast authentication protocol, " Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
    • (2002) Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, D.4
  • 38
    • 27544480006 scopus 로고    scopus 로고
    • [Online]. Available
    • R. Thomas, "ISP security bof, nanog 28, " 2003 [Online]. Available: Http://www.nanog.org/meetings/nanog28/presentations/thomas.pdf
    • (2003) ISP Security Bof, Nanog 28
    • Thomas, R.1
  • 39
    • 30744449603 scopus 로고    scopus 로고
    • Tabulation based 4-universal hashing with applications to second moment estimation
    • M. Thorup and Y. Zhang, "Tabulation based 4-universal hashing with applications to second moment estimation, " in Proc. SODA, 2004, pp. 615-624.
    • (2004) Proc. SODA , pp. 615-624
    • Thorup, M.1    Zhang, Y.2
  • 40
    • 70350757800 scopus 로고    scopus 로고
    • Packet-dropping adversary identification for data plane security
    • Art.
    • X. Zhang, A. Jain, and A. Perrig, "Packet-dropping adversary identification for data plane security, " in Proc. ACM CoNEXT, 2008, Art. no 24.
    • (2008) Proc. ACM CoNEXT , Issue.24
    • Zhang, X.1    Jain, A.2    Perrig, A.3
  • 41
    • 84878355953 scopus 로고    scopus 로고
    • Secure and scalable network fault localization under dynamic traffic patterns
    • X. Zhang, C. Lan, and A. Perrig, "Secure and scalable network fault localization under dynamic traffic patterns, " in Proc. IEEE Symp. Security Privacy, 2012, pp. 317-331.
    • (2012) Proc. IEEE Symp. Security Privacy , pp. 317-331
    • Zhang, X.1    Lan, C.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.