The new threat to internet: DNP attack with the attacking flows strategizing technology
暂无分享,去创建一个
Tianyang Zhou | Hang Li | Han Qiu | Qingxian Wang | Junhu Zhu | Heshuai Li | Junhu Zhu | Han Qiu | Qingxian Wang | Tian-yang Zhou | Heshuai Li | Hang Li
[1] Sha Hu,et al. Technology classification, industry, and education for Future Internet of Things , 2012, Int. J. Commun. Syst..
[2] George Kesidis,et al. Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network Simulation , 2011, ArXiv.
[3] Jia Wang,et al. A measurement study of Internet bottlenecks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Ying Zhang,et al. Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing , 2007, NDSS.
[5] Aziz Mohaisen,et al. Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.
[6] D. Richard Kuhn,et al. Study of BGP Peering Session Attacks and Their Impacts on Routing Performance , 2006, IEEE Journal on Selected Areas in Communications.
[7] Danny Dolev,et al. Internet resiliency to attacks and failures under BGP policy routing , 2006, Comput. Networks.
[8] Yu Wang,et al. A cascading failure model for interdomain routing system , 2012, Int. J. Commun. Syst..
[9] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[10] Shi Zhou,et al. Accurately modeling the Internet topology , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[11] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[12] Lixin Gao,et al. A measurement study on the impact of routing events on end-to-end internet path performance , 2006, SIGCOMM.
[13] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[14] Christopher Krügel,et al. Are BGP Routers Open to Attack? An Experiment , 2010, iNetSec.
[15] Peter Steenkiste,et al. Evaluation and characterization of available bandwidth probing techniques , 2003, IEEE J. Sel. Areas Commun..
[16] Hyunsoo Yoon,et al. Congestion control for sudden bandwidth changes in TCP , 2012, Int. J. Commun. Syst..
[17] Yongdae Kim,et al. Taking Routers Off Their Meds : Unstable Routers and the Buggy BGP Implementations That Cause Them , 2011 .
[18] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[19] Eunmi Choi,et al. A service-oriented taxonomical spectrum, cloudy challenges and opportunities of cloud computing , 2012, Int. J. Commun. Syst..