NeTS—FIND: Enabling Defense and Deterrence through Private Attribution

[1]  Amin Vahdat,et al.  Detour: a Case for Informed Internet Routing and Transport , 2007 .

[2]  Tal Garfinkel,et al.  SANE: A Protection Architecture for Enterprise Networks , 2006, USENIX Security Symposium.

[3]  Brent Waters,et al.  Compact Group Signatures Without Random Oracles , 2006, EUROCRYPT.

[4]  The costs and limits of availability for replicated services , 2001, TOCS.

[5]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[6]  Patrick D. McDaniel,et al.  Enterprise Security: A Community of Interest Based Approach , 2006, NDSS.

[7]  Stefan Savage,et al.  Self-stopping worms , 2005, WORM '05.

[8]  Michael Vrable,et al.  Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.

[9]  Xiaowei Yang,et al.  A DoS-limiting network architecture , 2005, SIGCOMM '05.

[10]  Mark Allman,et al.  An Architecture for Developing Behavioral History , 2005, SRUTI.

[11]  Stefan Savage,et al.  Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[12]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[13]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[14]  Patrick D. McDaniel,et al.  Analysis of Communities of Interest in Data Networks , 2005, PAM.

[15]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[16]  George Varghese,et al.  Automated Worm Fingerprinting , 2004, OSDI.

[17]  A. Snoeren,et al.  A system for authenticated policy-compliant routing , 2004, SIGCOMM '04.

[18]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[19]  Jan Camenisch,et al.  Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.

[20]  Stefan Savage,et al.  Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying , 2004, USENIX ATC, General Track.

[21]  Stefan Savage,et al.  Total Recall: System Support for Automated Availability Management , 2004, NSDI.

[22]  Alex C. Snoeren,et al.  Decoupling policy from mechanism in Internet routing , 2004, Comput. Commun. Rev..

[23]  David Wetherall,et al.  Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..

[24]  Hari Balakrishnan,et al.  Best-path vs. multi-path overlay routing , 2003, IMC '03.

[25]  Renata Teixeira,et al.  In search of path diversity in ISP networks , 2003, IMC '03.

[26]  Amin Vahdat,et al.  Toward scaling network emulation using topology partitioning , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..

[27]  Amin Vahdat,et al.  SHARP: an architecture for secure resource peering , 2003, SOSP '03.

[28]  Amin Vahdat,et al.  Bullet: high bandwidth data dissemination using an overlay mesh , 2003, SOSP '03.

[29]  George Varghese,et al.  Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.

[30]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[31]  Kang G. Shin,et al.  Evolution of the Internet QoS and support for soft real-time applications , 2003, Proc. IEEE.

[32]  David Moore,et al.  Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[33]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[34]  Theodore Johnson,et al.  Gigascope: a stream database for network applications , 2003, SIGMOD '03.

[35]  Stefan Savage,et al.  The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.

[36]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.

[37]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[38]  Amin Vahdat,et al.  Using Random Subsets to Build Scalable Network Services , 2003, USENIX Symposium on Internet Technologies and Systems.

[39]  David G. Andersen,et al.  Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .

[40]  Know your enemy , 2003, Nature Reviews Cancer.

[41]  Amin Vahdat,et al.  Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering , 2003 .

[42]  Stefan Savage,et al.  Understanding Availability , 2003, IPTPS.

[43]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[44]  Stefan Savage,et al.  Measuring packet reordering , 2002, IMW '02.

[45]  Amin Vahdat,et al.  Opus: an overlay peer utility service , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).

[46]  Amin Vahdat,et al.  Minimal replication cost for availability , 2002, PODC '02.

[47]  Dejan Kostic,et al.  Scalability and accuracy in a large-scale network emulator , 2002, CCRV.

[48]  Amin Vahdat,et al.  Self-Organizing Subsets: From Each According to His Abilities, to Each According to His Needs , 2002, IPTPS.

[49]  Vishal Malik,et al.  Distributed intrusion detection system , 2002 .

[50]  D. Andersen,et al.  Resilient overlay networks , 2002, CCRV.

[51]  Steven M. Bellovin,et al.  Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.

[52]  Stefan Savage,et al.  Robust congestion signaling , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[53]  Alex C. Snoeren,et al.  Mesh-based content routing using XML , 2001, SOSP.

[54]  Christine E. Jones,et al.  Hash-based IP traceback , 2001, SIGCOMM '01.

[55]  Craig Partridge,et al.  Hardware support for a hash-based IP traceback , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[56]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[57]  Amin Vahdat,et al.  Combining generality and practicality in a conit-based continuous consistency model for wide-area replication , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[58]  Stefan Savage,et al.  Alpine: A User-Level Infrastructure for Network Protocol Development , 2001, USITS.

[59]  Amin Vahdat,et al.  Transcoding characteristics of Web images , 2000, IS&T/SPIE Electronic Imaging.

[60]  Amin Vahdat,et al.  Application-level differentiated multimedia Web services using quality aware transcoding , 2000, IEEE Journal on Selected Areas in Communications.

[61]  Amin Vahdat,et al.  Efficient Numerical Error Bounding for Replicated Network Services , 2000, VLDB.

[62]  Craig Partridge,et al.  FIRE: flexible Intra-AS routing environment , 2000, IEEE J. Sel. Areas Commun..

[63]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[64]  Yin Zhang,et al.  Detecting Stepping Stones , 2000, USENIX Security Symposium.

[65]  Amin Vahdat,et al.  Managing the storage and battery resources in an image capture device (digital camera) using dynamic transcoding , 2000, WOWMOM '00.

[66]  Amin Vahdat,et al.  Building replicated Internet services using TACT: a toolkit for tunable availability and consistency tradeoffs , 2000, Proceedings Second International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2000.

[67]  Amin Vahdat,et al.  Differentiated multimedia Web services using quality aware transcoding , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[68]  Stefan Savage,et al.  Modeling TCP latency , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[69]  Amit Aggarwal,et al.  Understanding the performance of TCP pacing , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[70]  David R. Cheriton,et al.  TRIAD: A Scalable Deployable NAT-based Internet Architecture , 2000 .

[71]  Alex C. Snoeren,et al.  Adaptive inverse multiplexing for wide-area wireless networks , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).

[72]  Stefan Savage,et al.  Sting: A TCP-based Network Measurement Tool , 1999, USENIX Symposium on Internet Technologies and Systems.

[73]  Stefan Savage,et al.  TCP congestion control with a misbehaving receiver , 1999, CCRV.

[74]  Stefan Savage,et al.  The end-to-end effects of Internet path selection , 1999, SIGCOMM '99.

[75]  Amin Vahdat,et al.  Multimedia Web services for mobile clients using quality aware transcoding , 1999, WOWMOM '99.

[76]  Xipeng Xiao,et al.  Internet QoS: a big picture , 1999, IEEE Netw..

[77]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[78]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.