An optimal statistical test for robust detection against interest flooding attacks in CCN
暂无分享,去创建一个
[1] Bin Liu,et al. Mitigate DDoS attacks in NDN by interest traceback , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[2] Mauro Conti,et al. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[3] B. Melamed,et al. Traffic modeling for telecommunications networks , 1994, IEEE Communications Magazine.
[4] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[5] Gene Tsudik,et al. DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[6] Nikos Fotiou,et al. A Survey of Information-Centric Networking Research , 2014, IEEE Communications Surveys & Tutorials.
[7] Deborah Estrin,et al. Named Data Networking (NDN) Project , 2010 .
[8] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.
[9] Sasu Tarkoma,et al. The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture , 2009, Future Internet Assembly.
[10] Thomas Engel,et al. A semantic firewall for Content-Centric Networking , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[11] Tobias Lauinger,et al. Security & Scalability of Content-Centric Networking , 2010 .
[12] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[13] Stephen Farrell,et al. Network of Information (NetInf) - An information-centric networking architecture , 2013, Comput. Commun..
[14] Luciano Lavagno,et al. A key management scheme for Content Centric Networking , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[15] Jianqiang Tang,et al. Identifying Interest Flooding in Named Data Networking , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[16] Priya Mahadevan,et al. Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.
[17] Bengt Ahlgren,et al. A survey of information-centric networking , 2012, IEEE Communications Magazine.