메뉴 건너뛰기




Volumn , Issue , 2019, Pages 379-392

Building extensible networks with rule-based forwarding

Author keywords

[No Author keywords available]

Indexed keywords

SYSTEMS ANALYSIS;

EID: 85076913300     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (54)
  • 2
    • 6444230346 scopus 로고    scopus 로고
    • Arbor Networks Peakflow: www.arbornetworks.com/en/peakflow-ip-flowbased-technology.html.
    • Arbor Networks Peakflow
  • 4
    • 85080712101 scopus 로고    scopus 로고
    • CAIDA: www.caida.org/data/realtime/.
  • 9
    • 85080797614 scopus 로고    scopus 로고
    • Internet Systems Consortium, Internet Host Count History, https://www.isc.org/solutions/survey/history, 2009.
    • (2009) Internet Host Count History
  • 12
    • 85080762586 scopus 로고    scopus 로고
    • Open Flow Switch Consortium. http://www.openflowswitch.org.
  • 18
    • 33645492588 scopus 로고    scopus 로고
    • Digital Signature Standard DSS. Publication, June
    • Digital Signature Standard (DSS). Federal Information Processing Standards Publication, June 2009.
    • (2009) Federal Information Processing Standards
  • 20
    • 11244318344 scopus 로고    scopus 로고
    • Loose source routing as a mechanism for traffic policies
    • K. Argyraki and D. R. Cheriton. Loose Source Routing as a Mechanism for Traffic Policies. In ACM SIGCOMM Workshops, 2004.
    • (2004) ACM SIGCOMM Workshops
    • Argyraki, K.1    Cheriton, D.R.2
  • 21
    • 85050149881 scopus 로고    scopus 로고
    • Active internet traffic filtering: Real-time Response to Denialof-service attacks
    • K. Argyraki and D. R. Cheriton. Active Internet Traffic Filtering: Real-time Response to Denialof-Service Attacks. In USENIX Annual Conf., 2005.
    • (2005) USENIX Annual Conf
    • Argyraki, K.1    Cheriton, D.R.2
  • 23
    • 79961236654 scopus 로고    scopus 로고
    • The spoofer project: Inferring the extent of source address filtering on the Internet
    • R. Beverly and S. Bauer. The Spoofer project: Inferring the extent of source address filtering on the Internet. In SRUTI Workshop, 2005.
    • (2005) SRUTI Workshop
    • Beverly, R.1    Bauer, S.2
  • 25
    • 2442631039 scopus 로고    scopus 로고
    • Lightweight network support for scalable end-to-end services
    • August
    • K. L. Calvert, J. Griffioen, and S. Wen. Lightweight Network Support for Scalable End-to-End Services. In ACM SIGCOMM, August 2002.
    • (2002) ACM SIGCOMM
    • Calvert, K.L.1    Griffioen, J.2    Wen, S.3
  • 29
    • 36949005385 scopus 로고    scopus 로고
    • An end-middle-end approach to connection establishment
    • S. Guha and P. Francis. An End-Middle-End Approach to Connection Establishment. In ACM SIGCOMM, 2007.
    • (2007) ACM SIGCOMM
    • Guha, S.1    Francis, P.2
  • 31
    • 78149305172 scopus 로고    scopus 로고
    • PacketShader: A GPU-accelerated software router
    • S. Han, K. Jang, K. Park, and S. Moon. PacketShader: A GPU-Accelerated Software Router. In ACM SIGCOMM, 2010.
    • (2010) ACM SIGCOMM
    • Han, S.1    Jang, K.2    Park, K.3    Moon, S.4
  • 32
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • J. Ioannidis and S. M. Bellovin. Implementing Pushback: Router-Based Defense Against DDoS Attacks. In NDDS, 2002.
    • (2002) NDDS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 34
    • 62249110288 scopus 로고    scopus 로고
    • Fast point multiplication on Koblitz curves: Parallelization method and implementations
    • K. Järvinen et al. Fast point multiplication on Koblitz curves: Parallelization method and implementations. Microprocess. Microsyst., 33(2), 2009.
    • (2009) Microprocess. Microsyst. , vol.33 , Issue.2
    • Järvinen, K.1
  • 36
    • 70350665793 scopus 로고    scopus 로고
    • Passport: Secure and adoptable source authentication
    • X. Liu, A. Li, X. Yang, and D. Wetherall. Passport: Secure and Adoptable Source Authentication. In USENIX NSDI, 2008.
    • (2008) USENIX NSDI
    • Liu, X.1    Li, A.2    Yang, X.3    Wetherall, D.4
  • 37
    • 66249102841 scopus 로고    scopus 로고
    • To filter or to authorize: Network-layer dos Defense against Multimillion-node Botnets
    • X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In ACM SIGCOMM, 2008.
    • (2008) ACM SIGCOMM
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 40
    • 77952410514 scopus 로고    scopus 로고
    • Snapp: Stateless network-authenticated path pinning
    • B. Parno, A. Perrig, and D. G. Andersen. SNAPP: Stateless Network-Authenticated Path Pinning. In ACM ASIACCS, 2008.
    • (2008) ACM ASIACCS
    • Parno, B.1    Perrig, A.2    Andersen, D.G.3
  • 42
    • 85080795618 scopus 로고    scopus 로고
    • Rule-based Forwarding (RBF): Improving the internet's flexibility and security
    • L. Popa, N. Egi, S. Ratnasamy, and I. Stoica. Rule-based Forwarding (RBF): Improving the Internet's Flexibility and Security. UCB Technical Report, 2010. http://www.eecs.berkeley.edu/%7Epopa/rbfTechReport.pdf.
    • (2010) UCB Technical Report
    • Popa, L.1    Egi, N.2    Ratnasamy, S.3    Stoica, I.4
  • 43
    • 85047764379 scopus 로고    scopus 로고
    • Rule-based Forwarding (RBF): Improving the Internet's flexibility and security
    • L. Popa, I. Stoica, and S. Ratnasamy. Rule-based Forwarding (RBF): improving the Internet's flexibility and security. In ACM Hotnets, 2009.
    • (2009) ACM Hotnets
    • Popa, L.1    Stoica, I.2    Ratnasamy, S.3
  • 44
    • 33750357978 scopus 로고    scopus 로고
    • A system for authenticated policy-compliant routing
    • B. Raghavan and A. C. Snoeren. A System for Authenticated Policy-Compliant Routing. In ACM SIGCOMM, 2004.
    • (2004) ACM SIGCOMM
    • Raghavan, B.1    Snoeren, A.C.2
  • 50
    • 84875682345 scopus 로고    scopus 로고
    • Active network vision and reality: Lessons from a capsulebased system
    • D. Wetherall. Active network vision and reality: Lessons from a capsulebased system. In ACM SOSP, 1999.
    • (1999) ACM SOSP
    • Wetherall, D.1
  • 51
    • 3543097593 scopus 로고    scopus 로고
    • SIff: A stateless internet flow filter to mitigate DDoS flooding attacks
    • A. Yaar, A. Perrig, and D. Song. SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In IEEE Symp. on Sec. and Priv., 2004.
    • (2004) IEEE Symp. On Sec. On Priv.
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 53
    • 77954196120 scopus 로고    scopus 로고
    • A high performance ECC hardware implementation with instruction-level parallelism over GF(2163)
    • Y. Zhang, D. Chen, Y. Choi, L. Chen, and S.-B. Ko. A high performance ECC hardware implementation with instruction-level parallelism over GF(2163). Microprocess. Microsyst., 34(6), 2010.
    • (2010) Microprocess. Microsyst. , vol.34 , Issue.6
    • Zhang, Y.1    Chen, D.2    Choi, Y.3    Chen, L.4    Ko, S.-B.5
  • 54
    • 77952248898 scopus 로고    scopus 로고
    • Addressing shared resource contention in multicore processors via scheduling
    • S. Zhuravleva, S. Blagodurov, et al. Addressing Shared Resource Contention in Multicore Processors via Scheduling. In ASPLOS, 2010.
    • (2010) ASPLOS
    • Zhuravleva, S.1    Blagodurov, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.