Experimental Validation of Architectural Solutions

Project co-funded by the European Commission within the Sixth Framework Programme (2002-2006)

[1]  Dave Aitel,et al.  The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .

[2]  Olivier Bonaventure,et al.  The HoneyTank: a scalable approach to collect malicious internet traffic , 2008, Int. J. Crit. Infrastructures.

[3]  Mark R. Crispin Internet Message Access Protocol - Version 4rev1 , 1996, RFC.

[4]  Chen-Nee Chuah,et al.  Characterization of Failures in an Operational IP Backbone Network , 2008, IEEE/ACM Transactions on Networking.

[5]  Farnam Jahanian,et al.  The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.

[6]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[7]  Vishal Malik,et al.  Distributed intrusion detection system , 2002 .

[8]  Van-Hau Pham,et al.  on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .

[9]  Geert Deconinck,et al.  Architecture, Services and Protocols for CRUTIAL , 2009 .

[10]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[11]  Miguel Correia,et al.  Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.

[12]  Krishna P. Gummadi,et al.  Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.

[13]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[14]  Richard Luczak,et al.  The PAPI Cross-Platform Interface to Hardware Performance Counters , 2001 .

[15]  Geert Deconinck,et al.  FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[16]  Andrew A. Chien,et al.  Tolerating denial-of-service attacks using overlay networks: impact of topology , 2003, SSRS '03.

[17]  Fred B. Schneider,et al.  Implementing trustworthy services using replicated state machines , 2005, IEEE Security & Privacy Magazine.

[18]  Paul V. Mockapetris,et al.  Domain names - implementation and specification , 1987, RFC.

[19]  Alex C. Snoeren,et al.  Mesh-based content routing using XML , 2001, SOSP.

[20]  Stephen T. Kent,et al.  IP Authentication Header , 1995, RFC.

[21]  Zhuoqing Morley Mao,et al.  Toward understanding distributed blackhole placement , 2004, WORM '04.

[22]  Chen-Nee Chuah,et al.  On the analysis of overlay failure detection and recovery , 2007, Comput. Networks.

[23]  David L. Mills,et al.  Network Time Protocol (NTP) , 1985, RFC.

[24]  D. Hoffman,et al.  The special needs of SCADA/PCN firewalls: architectures and test results , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[25]  Paulo Veríssimo,et al.  Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.

[26]  Miguel Correia,et al.  Using Attack Injection to Discover New Vulnerabilities , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[27]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[28]  John Gilmore,et al.  Bootstrap Protocol , 1985, RFC.

[29]  Miguel Correia,et al.  The Middleware Architecture of MAFTIA: A Blueprint , 2000 .

[30]  Michael Dahlin,et al.  End-to-end WAN service availability , 2001, TNET.

[31]  Mark R. Crispin,et al.  Internet Message Access Protocol - Version 4 , 1994, RFC.

[32]  Paulo Veríssimo,et al.  Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.

[33]  Philippe Owezarski,et al.  Internet attacks monitoring with dynamic connection redirection mechanisms , 2007, Journal in Computer Virology.

[34]  Hari Balakrishnan,et al.  Best-path vs. multi-path overlay routing , 2003, IMC '03.

[35]  Hassan Artail,et al.  A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks , 2006, Comput. Secur..

[36]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[37]  Paulo Veríssimo,et al.  Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.

[38]  Jonathan Kirsch,et al.  Scaling Byzantine Fault-Tolerant Replication toWide Area Networks , 2006, International Conference on Dependable Systems and Networks (DSN'06).