Optimal Filtering of Source Address Prefixes: Models and Algorithms
暂无分享,去创建一个
[1] Cristian Estan,et al. On Filtering of DDoS Attacks Based on Source Address Prefixes , 2006, 2006 Securecomm and Workshops.
[2] Hans Kellerer,et al. Approximation algorithms for knapsack problems with cardinality constraints , 2000, Eur. J. Oper. Res..
[3] Eddie Kohler,et al. Observed structure of addresses in IP traffic , 2006, TNET.
[4] Paul Barford,et al. Spatial-Temporal Characteristics of Internet Malicious Sources , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Eddie Kohler,et al. Observed Structure of Addresses in IP Traffic , 2002, IEEE/ACM Transactions on Networking.
[6] Robert Beverly,et al. The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet , 2005, SRUTI.
[7] Katerina J. Argyraki,et al. Optimal Filtering of Malicious IP Sources , 2008, ArXiv.
[8] Deeparnab Chakrabarty,et al. Knapsack Problems , 2008 .
[9] Eugene Levner,et al. Computational Complexity of Approximation Algorithms for Combinatorial Problems , 1979, MFCS.
[10] Nick Feamster,et al. Accountable internet protocol (aip) , 2008, SIGCOMM '08.
[11] George Varghese,et al. Network algorithmics , 2004 .
[12] 穂鷹 良介. Non-Linear Programming の計算法について , 1963 .
[13] David R. Cheriton,et al. Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.
[14] Robert Beverly,et al. The spoofer project: inferring the extent of source address filtering on the internet , 2005 .
[15] F. Soldo,et al. Filtering sources of unwanted traffic , 2008, 2008 Information Theory and Applications Workshop.
[16] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[17] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[18] A. Bagchi,et al. LP relaxation of the two dimensional knapsack problem with box and GUB constraints , 1996 .
[19] Xin Liu,et al. Passport: Secure and Adoptable Source Authentication , 2008, NSDI.