Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network
暂无分享,去创建一个
[1] Kevin R. Fall,et al. The NS Manual (Formerly NS Notes and Documentation , 2002 .
[2] Xin Liu,et al. Realistic Large-Scale Online Network Simulation , 2004, Proceedings of the ACM/IEEE SC2004 Conference.
[3] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[4] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[5] Ratul Mahajan,et al. A Study of the Performance Potential of DHT-based Overlays , 2003, USENIX Symposium on Internet Technologies and Systems.
[6] Xin Liu,et al. Traffic-based Load Balance for Scalable Network Emulation , 2003, ACM/IEEE SC 2003 Conference (SC'03).
[7] Scott Shenker,et al. Internet indirection infrastructure , 2002, SIGCOMM 2002.
[8] Richard Wolski,et al. Data logistics in network computing: the logistical session layer , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.
[9] Kirk Lougheed,et al. Border Gateway Protocol (BGP) , 2021, IP Routing Protocols.
[10] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[11] Rami G. Melhem,et al. Roaming honeypots for mitigating service-level denial-of-service attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[12] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[13] Xin Liu,et al. Validating and Scaling the MicroGrid: A Scientific Instrument for Grid Dynamics , 2004, Journal of Grid Computing.
[14] Ion Stoica,et al. Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..
[15] Angelos D. Keromytis,et al. WebSOS: an overlay-based system for protecting web servers from denial of service attacks , 2005, Comput. Networks.
[16] Ion Stoica,et al. Towards a More Functional and Secure Network Infrastructure , 2003 .
[17] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[18] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[19] Andrew A. Chien,et al. Tolerating denial-of-service attacks using overlay networks: impact of topology , 2003, SSRS '03.
[20] David M. Nicol,et al. Simulating realistic network worm traffic for worm warning system design and testing , 2003, WORM '03.
[21] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[22] Ju Wang,et al. Understanding when location-hiding using overlay networks is feasible , 2006, Comput. Networks.
[23] Dmitri Loguinov,et al. Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience , 2003, IEEE/ACM Transactions on Networking.
[24] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[25] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.