Exploiting Internet Delay Space Properties for Sybil Attack Mitigation
暂无分享,去创建一个
Bo Zhang | T. S. Eugene Ng | Bo Zhang | T. Ng
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[3] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[4] CastroMiguel,et al. Secure routing for structured peer-to-peer overlay networks , 2002 .
[5] Zhuoqing Morley Mao,et al. Accurate Real-time Identification of IP Prefix Hijacking , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[7] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[8] Zhi-Li Zhang,et al. On suitability of Euclidean embedding of internet hosts , 2006, SIGMETRICS '06/Performance '06.
[9] Peter Druschel,et al. Measurement-based analysis, modeling, and synthesis of the internet delay space , 2010, TNET.
[10] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[11] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM 2007.
[12] Dave Levin,et al. PeerWise Discovery and Negotiation of Faster Paths , 2007, HotNets.
[13] Eng Keong Lua,et al. Embeddable Overlay Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[14] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[15] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[16] Marcel Dischinger,et al. Characterizing residential broadband networks , 2007, IMC '07.
[17] Dan Pei,et al. A light-weight distributed scheme for detecting ip prefix hijacks in real-time , 2007, SIGCOMM 2007.
[18] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[19] H. Rowaihy,et al. Limiting Sybil Attacks in Structured Peer-to-Peer Networks , 2005 .
[20] Bo Zhang,et al. Measurement-Based Analysis, Modeling, and Synthesis of the Internet Delay Space , 2006, IEEE/ACM Transactions on Networking.
[21] Bo Zhang,et al. Towards network triangle inequality violation aware distributed systems , 2007, IMC '07.
[22] Hui Zhang,et al. Predicting Internet network distance with coordinates-based approaches , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[23] Rida A. Bazzi,et al. On the establishment of distinct identities in overlay networks , 2005, PODC '05.
[24] Robert Tappan Morris,et al. Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM '04.