메뉴 건너뛰기




Volumn , Issue , 2008, Pages 45-58

Phalanx: Withstanding multimillion-node botnets

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; NETWORK SECURITY; SYSTEMS ANALYSIS;

EID: 85094665335     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (40)
  • 2
    • 85094666870 scopus 로고    scopus 로고
    • May 9 2007
    • Microsoft's unabated patch flow. http://www.avertlabs.com/research/blog/index.php/category/ security-bulletins/, May 9 2007.
    • Microsoft's unabated patch flow
  • 3
  • 5
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for internet services
    • D. G. Andersen. Mayday: Distributed filtering for internet services. In USITS, 2003.
    • (2003) USITS
    • Andersen, D. G.1
  • 7
    • 3543121457 scopus 로고    scopus 로고
    • Preventing internet denial-of-service with capabilities
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-of-service with capabilities. In HotNets-II, 2003.
    • (2003) HotNets-II
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 8
    • 34250668440 scopus 로고    scopus 로고
    • Network capabilities: The good, the bad and the ugly
    • K. Argyraki and D. Cheriton. Network capabilities: The good, the bad and the ugly. In HotNets-IV, 2005.
    • (2005) HotNets-IV
    • Argyraki, K.1    Cheriton, D.2
  • 9
    • 85094650994 scopus 로고    scopus 로고
    • Real-time response to denial-of-service attacks
    • K. Argyraki and D. R. Cheriton. Real-time response to denial-of-service attacks. In USENIX, 2005.
    • (2005) USENIX
    • Argyraki, K.1    Cheriton, D. R.2
  • 12
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B. H.1
  • 13
    • 34250640971 scopus 로고    scopus 로고
    • Flow-cookies: Using bandwidth amplification to defend against DDoS flooding attacks
    • M. Casado, P. Cao, A. Akella, and N. Provos. Flow-cookies: Using bandwidth amplification to defend against DDoS flooding attacks. In IWQoS, 2006.
    • (2006) IWQoS
    • Casado, M.1    Cao, P.2    Akella, A.3    Provos, N.4
  • 14
    • 2442593059 scopus 로고    scopus 로고
    • Serving DNS using a peer-to-peer lookup service
    • R. Cox, A. Muthitacharoen, and R. Morris. Serving DNS using a peer-to-peer lookup service. In IPTPS, 2002.
    • (2002) IPTPS
    • Cox, R.1    Muthitacharoen, A.2    Morris, R.3
  • 15
    • 85094675346 scopus 로고    scopus 로고
    • The sybil attack
    • J. R. Douceur. The sybil attack. In IPTPS, 2001.
    • (2001) IPTPS
    • Douceur, J. R.1
  • 17
    • 77952415099 scopus 로고    scopus 로고
    • An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
    • J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In CCS, 2007.
    • (2007) CCS
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 21
    • 8344224137 scopus 로고    scopus 로고
    • Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants
    • A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants. In SIGCOMM, 2003.
    • (2003) SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.2
  • 24
    • 51349153757 scopus 로고    scopus 로고
    • dFence: Transparent Network-based Denial of Service Mitigation
    • A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang. dFence: Transparent Network-based Denial of Service Mitigation. In NSDI, 2007.
    • (2007) NSDI
    • Mahimkar, A.1    Dange, J.2    Shmatikov, V.3    Vin, H.4    Zhang, Y.5
  • 26
    • 36949036429 scopus 로고    scopus 로고
    • Portcullis: Protecting connection setup from Denial-of-Capbility attacks
    • B. Parno, D. Wendlant, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting connection setup from Denial-of-Capbility attacks. In SIGCOMM, 2007.
    • (2007) SIGCOMM
    • Parno, B.1    Wendlant, D.2    Shi, E.3    Perrig, A.4    Maggs, B.5    Hu, Y.-C.6
  • 28
    • 24044433162 scopus 로고    scopus 로고
    • The design and implementation of a next generation name service for the internet
    • V. Ramasubramanian and E. G. Sirer. The design and implementation of a next generation name service for the internet. In SIGCOMM, 2004.
    • (2004) SIGCOMM
    • Ramasubramanian, V.1    Sirer, E. G.2
  • 33
    • 33745781163 scopus 로고    scopus 로고
    • Countering DoS attacks with stateless multipath overlays
    • A. Stavrou and A. D. Keromytis. Countering DoS attacks with stateless multipath overlays. In CCS, 2005.
    • (2005) CCS
    • Stavrou, A.1    Keromytis, A. D.2
  • 35
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP Overlay Network for Tracking DoS Floods
    • R. Stone. CenterTrack: An IP Overlay Network for Tracking DoS Floods. In USENIX Security, 2000.
    • (2000) USENIX Security
    • Stone, R.1
  • 36
    • 0036367741 scopus 로고    scopus 로고
    • Overlook: Scalable name service on an overlay network
    • M. Theimer and M. B. Jones. Overlook: Scalable name service on an overlay network. In ICDCS, 2002.
    • (2002) ICDCS
    • Theimer, M.1    Jones, M. B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.