메뉴 건너뛰기




Volumn , Issue , 2015, Pages 817-832

Bohatei: Flexible and elastic DDoS defense

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY;

EID: 85076279342     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (293)

References (60)
  • 1
    • 85076318638 scopus 로고    scopus 로고
    • Bohatei. https://github.com/ddos-defense/bohatei.
  • 2
    • 84885573531 scopus 로고    scopus 로고
    • Amazon EC2. http://aws.amazon.com/ec2/.
    • Amazon EC2
  • 8
    • 85076313299 scopus 로고    scopus 로고
    • CloudFlare. https://www.cloudflare.com/ddos.
    • CloudFlare
  • 11
  • 13
    • 85076320316 scopus 로고    scopus 로고
    • iptables. http://www.netfilter.org/projects/iptables/.
  • 16
    • 85076265760 scopus 로고    scopus 로고
    • Open vSwitch. http://openvswitch.org/.
  • 19
    • 85076303453 scopus 로고    scopus 로고
    • Prolexic. http://www.prolexic.com/.
  • 20
    • 85076306197 scopus 로고    scopus 로고
    • Radware. http://www.radware.com/Solutions/Security/.
  • 22
  • 25
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for internet services
    • D. G. Andersen. Mayday: Distributed filtering for internet services. In Proc. USITS, 2003.
    • (2003) Proc. USITS
    • Andersen, D.G.1
  • 31
    • 85071935677 scopus 로고    scopus 로고
    • Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags
    • S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags. In Proc. NSDI, 2014.
    • (2014) Proc. NSDI
    • Fayazbakhsh, S.K.1    Chiang, L.2    Sekar, V.3    Yu, M.4    Mogul, J.C.5
  • 34
    • 84883290864 scopus 로고    scopus 로고
    • B4: Experience with a globally-deployed software defined wan
    • Jain et al. B4: Experience with a globally-deployed software defined wan. In Proc. SIGCOMM, 2013.
    • (2013) Proc. SIGCOMM
    • Jain1
  • 35
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed ddos traffic
    • C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: An effective defense against spoofed ddos traffic. In Proc. CCS, 2003.
    • (2003) Proc. CCS
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 36
    • 24644463787 scopus 로고    scopus 로고
    • Efficient algorithms for online decision problems
    • A. Kalai and S. Vempala. Efficient algorithms for online decision problems. J. Comput. Syst. Sci., 2005.
    • (2005) J. Comput. Syst. Sci.
    • Kalai, A.1    Vempala, S.2
  • 38
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. In Proc. SIGCOMM, 2005.
    • (2005) Proc. SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 39
    • 1242263196 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network
    • R. Mahajan et al. Controlling high bandwidth aggregates in the network. CCR, 2001.
    • (2001) CCR
    • Mahajan, R.1
  • 40
    • 68649129121 scopus 로고    scopus 로고
    • OpenFlow: Enabling innovation in campus networks
    • March
    • N. McKeown et al. OpenFlow: enabling innovation in campus networks. CCR, March 2008.
    • (2008) CCR
    • McKeown, N.1
  • 41
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. In CCR, 2004.
    • (2004) CCR
    • Mirkovic, J.1    Reiher, P.2
  • 45
    • 84883284665 scopus 로고    scopus 로고
    • Ananta: Cloud scale load balancing
    • P. Patel et al. Ananta: cloud scale load balancing. In Proc. ACM SIGCOMM, 2013.
    • (2013) Proc. ACM SIGCOMM
    • Patel, P.1
  • 46
    • 0033295259 scopus 로고    scopus 로고
    • BrO: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 48
    • 85090433665 scopus 로고    scopus 로고
    • SnORT - Lightweight intrusion detection for networks
    • M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In LISA, 1999.
    • (1999) LISA
    • Roesch, M.1
  • 49
    • 85180629124 scopus 로고    scopus 로고
    • Amplification hell: Revisiting network protocols for ddos abuse
    • C. Rossow. Amplification hell: Revisiting network protocols for ddos abuse. In Proc. USENIX Security, 2014.
    • (2014) Proc. USENIX Security
    • Rossow, C.1
  • 50
    • 84891354309 scopus 로고    scopus 로고
    • Simplifying the synthesis of internet traffic matrices
    • M. Roughan. Simplifying the Synthesis of Internet Traffic Matrices. ACM SIGCOMM CCR, 2005.
    • (2005) ACM SIGCOMM CCR
    • Roughan, M.1
  • 53
  • 54
    • 84889062725 scopus 로고    scopus 로고
    • AvaNT-Guard: Scalable and vigilant switch flow management in software-defined networks
    • S. Shin, V. Yegneswaran, P. Porras, and G. Gu. AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks. In Proc. CCS, 2013.
    • (2013) Proc. CCS
    • Shin, S.1    Yegneswaran, V.2    Porras, P.3    Gu, G.4
  • 56
    • 84907337343 scopus 로고    scopus 로고
    • Network virtualization in multi-tenant datacenters
    • T. Koponen et al. Network virtualization in multi-tenant datacenters. In Proc. NSDI, 2014.
    • (2014) Proc. NSDI
    • Koponen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.