Fatih: detecting and isolating malicious routers
暂无分享,去创建一个
Stefan Savage | Keith Marzullo | Yuchung Cheng | A. T. Mizrak | Alper Tugay Mizrak | S. Savage | K. Marzullo | Yuchung Cheng | A. Mizrak
[1] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Leslie Lamport,et al. Distributed snapshots: determining global states of distributed systems , 1985, TOCS.
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[6] Matt Bishop. A Security Analysis of Version 2 of the Network Time Protocol NTP: A Report to the Privacy and Security Research Group , 1991 .
[7] Radia Perlman. Interconnections: Bridges and Routers , 1992 .
[8] John Moy,et al. Multicast Extensions to OSPF , 1994, RFC.
[9] John Moy,et al. Multicast routing extensions for OSPF , 1994, CACM.
[10] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[11] J.J. Garcia-Luna-Aceves,et al. Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[12] S. Cheung,et al. An efficient message authentication scheme for link state routing , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[13] Karl N. Levitt,et al. Protecting routing infrastructures from denial of service using cooperative intrusion detection , 1998, NSPW '97.
[14] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[15] Craig Partridge,et al. Packet reordering is not pathological network behavior , 1999, TNET.
[16] Marc Dacier,et al. Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks , 1999, Recent Advances in Intrusion Detection.
[17] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[18] Matthew J. Zekauskas,et al. A One-way Packet Loss Metric for IPPM , 1999, RFC.
[19] Shay Kutten,et al. Early Detection of Message Forwarding Faults , 2000, SIAM J. Comput..
[20] Charles Lynn,et al. Secure Border Gateway Protocol (Secure-BGP) , 2000 .
[21] Feiyi Wang,et al. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[22] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[23] Tuomas Aura,et al. Using conservation of flow as a security mechanism in network protocols , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[24] Nick G. Duffield,et al. Trajectory sampling for direct traffic observation , 2001, TNET.
[25] M. Goodrich. Efficient and Secure Network Routing Algorithms , 2001 .
[26] Jeff Dike,et al. User-mode Linux , 2006, Annual Linux Showcase & Conference.
[27] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[28] Michael Bailey,et al. Shining Light on Dark Address Space , 2001 .
[29] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[30] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[31] Stefan Savage,et al. Measuring packet reordering , 2002, IMW '02.
[32] Dennis P. Carrigan,et al. Security: Adding Protection to the Network via the Network Processor , 2002 .
[33] David Moore,et al. Beyond folklore: observations on fragmented traffic , 2002, TNET.
[34] Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
[35] Yaron Minsky,et al. Set reconciliation with nearly optimal communication complexity , 2003, IEEE Trans. Inf. Theory.
[36] Renata Teixeira,et al. In search of path diversity in ISP networks , 2003, IMC '03.
[37] Al Morton,et al. Packet Reordering Metric for IPPM , 2003 .
[38] Ratul Mahajan,et al. Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.
[39] Hisashi Kobayashi,et al. Amendment to: Highly Secure and Efficient Routing , 2004 .
[40] Hisashi Kobayashi,et al. Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.
[41] Volker Roth,et al. Listen and whisper: security mechanisms for BGP , 2004 .
[42] Stefan Savage,et al. Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.
[43] Stefan Savage,et al. Detecting malicious routers , 2007 .
[44] S. Savage,et al. Report on Dimacs * Workshop on Large-scale Internet Attacks , .