A denial-of-service resistant DHT
暂无分享,去创建一个
[1] Michael Weber,et al. Protecting web servers from distributed denial of service attacks , 2001, WWW '01.
[2] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[3] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[4] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[5] Ion Stoica,et al. Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..
[6] Richard M. Karp,et al. Randomized rumor spreading , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[7] Angelos D. Keromytis,et al. WebSOS: an overlay-based system for protecting web servers from denial of service attacks , 2005, Comput. Networks.
[8] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[9] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[10] George Lawton. Stronger Domain Name System Thwarts Root-Server Attacks , 2007, Computer.
[11] Jelena Mirkovic,et al. A Framework for a Collaborative DDoS Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[12] Moni Naor,et al. Novel architectures for P2P applications: the continuous-discrete approach , 2003, SPAA '03.
[13] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[14] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[15] Christian Scheideler,et al. Towards a Scalable and Robust DHT , 2006, SPAA '06.
[16] Christian Scheideler,et al. A denial-of-service resistant DHT , 2007, ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing.
[17] Ben Y. Zhao,et al. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and , 2001 .
[18] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.
[19] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[20] Kurt Mehlhorn,et al. Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories , 1984, Acta Informatica.
[21] Yunheung Paek,et al. Advances in Computer Systems Architecture , 2008 .
[22] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[23] Venkata N. Padmanabhan,et al. The Case for Cooperative Networking , 2002, IPTPS.
[24] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[25] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[26] Mary Baker,et al. Peer-to-Peer Caching Schemes to Address Flash Crowds , 2002, IPTPS.
[27] Dan Rubenstein,et al. A lightweight, robust P2P system to handle flash crowds , 2002, IEEE Journal on Selected Areas in Communications.
[28] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.