메뉴 건너뛰기




Volumn , Issue , 2008, Pages 365-378

Passport: Secure and adoptable source authentication

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SYSTEMS ANALYSIS;

EID: 85083279650     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (123)

References (51)
  • 1
    • 85094663859 scopus 로고    scopus 로고
    • CAIDA Report
    • CAIDA Report. http://www.caida.org/analysis/AIX/plen_hist/, 2000.
    • (2000)
  • 2
    • 85050149881 scopus 로고    scopus 로고
    • Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks
    • K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX, 2005.
    • (2005) USENIX
    • Argyraki, K.1    Cheriton, D.2
  • 3
    • 34748848955 scopus 로고    scopus 로고
    • Ingress Filtering for Multihomed Networks
    • RFC 3704
    • F. Baker and P. Savola. Ingress Filtering for Multihomed Networks. RFC 3704, 2004.
    • (2004)
    • Baker, F.1    Savola, P.2
  • 7
    • 33749858184 scopus 로고    scopus 로고
    • The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet
    • R. Beverly and S. Bauer. The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet. In USENIX SRUTI, 2005.
    • (2005) USENIX SRUTI
    • Beverly, R.1    Bauer, S.2
  • 9
    • 85092759913 scopus 로고    scopus 로고
    • Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection
    • M. Casado, A. Akella, P. Cao, N. Provos, and S. Shenker. Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection. In USENIX SRUTI, 2006.
    • (2006) USENIX SRUTI
    • Casado, M.1    Akella, A.2    Cao, P.3    Provos, N.4    Shenker, S.5
  • 11
    • 85094663824 scopus 로고    scopus 로고
    • Deterlab
    • Deterlab. http://www.deterlab.net/.
  • 13
    • 0010057139 scopus 로고    scopus 로고
    • Analysis of the Autonomous System Network Topology
    • July
    • D.Magoni and J.J.Pansiot. Analysis of the Autonomous System Network Topology. ACM SIGCOMM CCR, 31(3), July 2001.
    • (2001) ACM SIGCOMM CCR , vol.31 , Issue.3
    • Magoni, D.1    Pansiot, J.J.2
  • 14
    • 39049160574 scopus 로고    scopus 로고
    • Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
    • Z. Duan, X. Yuan, and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In IEEE Infocom, 2006.
    • (2006) IEEE Infocom
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 15
    • 85094645639 scopus 로고
    • Visa Protocols for Controlling Inter-Organization Datagram Flow
    • D. Estrin, J. C. Mogul, G. Tsudik., and K.Anand. Visa Protocols for Controlling Inter-Organization Datagram Flow. IEEE JSAC, 1989.
    • (1989) IEEE JSAC
    • Estrin, D.1    Mogul, J. C.2    Tsudik, G.3    Anand, K.4
  • 16
    • 0003553457 scopus 로고    scopus 로고
    • Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing
    • RFC 2827, May
    • P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, May 2000.
    • (2000)
    • Ferguson, P.1    Senie, D.2
  • 17
  • 19
    • 0039178161 scopus 로고    scopus 로고
    • Guidelines for creation, selection, and registration of an Autonomous System (AS)
    • J. Hawkinson and T. Bates. Guidelines for creation, selection, and registration of an Autonomous System (AS). RFC 1930, 1996.
    • (1996) RFC 1930
    • Hawkinson, J.1    Bates, T.2
  • 20
    • 85027203109 scopus 로고    scopus 로고
    • Helion Technology
    • Helion Technology. AES Cores. http://www.heliontech.com/aes. htm, 2008.
    • (2008) AES Cores
  • 21
    • 17644411571 scopus 로고    scopus 로고
    • Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic
    • C. Jin, H. Wang, and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In ACM CCS, 2003.
    • (2003) ACM CCS
    • Jin, C.1    Wang, H.2    Shin, K. G.3
  • 27
    • 65249174426 scopus 로고    scopus 로고
    • Efficient and Secure Source Authentication with Packet Passports
    • X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In USENIX SRUTI, 2006.
    • (2006) USENIX SRUTI
    • Liu, X.1    Yang, X.2    Wetherall, D.3    Anderson, T.4
  • 29
    • 0003256793 scopus 로고    scopus 로고
    • Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers
    • K. Nichols, S. Blake, F. Baker, and D. Black. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, 1998.
    • (1998) RFC , vol.2474
    • Nichols, K.1    Blake, S.2    Baker, F.3    Black, D.4
  • 31
    • 0001083965 scopus 로고    scopus 로고
    • On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
    • K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 32
    • 0030661010 scopus 로고    scopus 로고
    • Ticket Based Service Access for the Mobile User
    • B. Patel and J. Crowcroft. Ticket Based Service Access for the Mobile User. In ACM MobiCom, 1997.
    • (1997) ACM MobiCom
    • Patel, B.1    Crowcroft, J.2
  • 34
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and Secure Source Authentication for Multicast
    • A. Perrig, R. Canetti, D. Song, and J. D. Tygar. Efficient and Secure Source Authentication for Multicast. In NDSS, 2001.
    • (2001) NDSS
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J. D.4
  • 35
    • 33750357978 scopus 로고    scopus 로고
    • A System for Authenticated Policy-Compliant Routing
    • B. Raghavan and A. C. Snoeren. A System for Authenticated Policy-Compliant Routing. In ACM SIGCOMM, 2004.
    • (2004) ACM SIGCOMM
    • Raghavan, B.1    Snoeren, A. C.2
  • 37
    • 85094668684 scopus 로고    scopus 로고
    • RouteViews Project
    • RouteViews Project. http://www.routeviews.org/.
  • 39
    • 85094654144 scopus 로고    scopus 로고
    • Anatomy of recent DNS reflector attacks from the victim and reflector points of view
    • June
    • F. Scalzo. Anatomy of recent DNS reflector attacks from the victim and reflector points of view. Nanog37 Presentation, June 2006.
    • (2006) Nanog37 Presentation
    • Scalzo, F.1
  • 41
    • 0034997397 scopus 로고    scopus 로고
    • Advance and Authenticated Marking Schemes for IP Traceback
    • D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
    • (2001) Proc. IEEE Infocom
    • Song, D.1    Perrig, A.2
  • 48
    • 85015385962 scopus 로고    scopus 로고
    • StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
    • A. Yaar, A. Perrig, and D. Song. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE JSAC, 2006.
    • (2006) IEEE JSAC
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.