Protecting internet infrastructure against link flooding attacks: A techno-economic perspective
暂无分享,去创建一个
Bo An | Xiaohong Guan | Jianfeng Li | Yajuan Tang | Xiaobo Ma | Bo An | Yajuan Tang | X. Guan | Xiaobo Ma | Jianfeng Li
[1] J. Nash. THE BARGAINING PROBLEM , 1950, Classics in Game Theory.
[2] Dieter Kratsch,et al. Space-Efficient Biconnected Components and Recognition of Outerplanar Graphs , 2016, Algorithmica.
[3] Lei Xue,et al. LinkScope: Toward Detecting Target Link Flooding Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[4] Xiapu Luo,et al. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[5] Xenofontas A. Dimitropoulos,et al. A novel framework for modeling and mitigating distributed link flooding attacks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[6] Xenofontas A. Dimitropoulos,et al. On the Interplay of Link-Flooding Attacks and Traffic Engineering , 2016, CCRV.
[7] Dan Wang,et al. TDS: Time-dependent sponsored data plan for wireless data traffic market , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[8] L. Xia,et al. Developments in Research on Pricing on the Internet , 2016 .
[9] Vyas Sekar,et al. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks , 2016, NDSS.
[10] Mehmet Simsek. A new metric for flow-level filtering of low-rate DDoS attacks , 2015, Secur. Commun. Networks.
[11] Ufuk Topcu,et al. An approximately truthful mechanism for electric vehicle charging via joint differential privacy , 2015, 2015 American Control Conference (ACC).
[12] Lei Xue,et al. Towards Detecting Target Link Flooding Attack , 2014, LISA.
[13] Virgil D. Gligor,et al. Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures , 2014, CCS.
[14] Dan Wang,et al. Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[15] Leandros Tassiulas,et al. Bargaining-Based Mobile Data Offloading , 2014, IEEE Journal on Selected Areas in Communications.
[16] Tiankui Zhang,et al. Opportunistic User Association for Multi-Service HetNets Using Nash Bargaining Solution , 2014, IEEE Communications Letters.
[17] Xiapu Luo,et al. Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[18] Aaron Roth,et al. Mechanism design in large games: incentives and privacy , 2012, ITCS.
[19] Amir Herzberg,et al. Bandwidth Distributed Denial of Service: Attacks and Defenses , 2014, IEEE Security & Privacy.
[20] Virgil D. Gligor,et al. CoDef: collaborative defense against large-scale link-flooding attacks , 2013, CoNEXT.
[21] Jinjun Chen,et al. A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..
[22] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[23] Richard T. B. Ma,et al. On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation , 2013, Comput. Networks.
[24] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[25] Weifeng Chen,et al. Flow level detection and filtering of low-rate DDoS , 2012, Comput. Networks.
[26] Lixia Zhang,et al. Explaining BGP Slow Table Transfers , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[27] Noam Nisan,et al. Incentive-compatible distributed greedy protocols , 2011, PODC '11.
[28] Aziz Mohaisen,et al. Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.
[29] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[30] Xiapu Luo,et al. Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring , 2009, USENIX Annual Technical Conference.
[31] John C. S. Lui,et al. Mathematical modeling of incentive policies in p2p systems , 2008, NetEcon '08.
[32] Ying Zhang,et al. Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing , 2007, NDSS.
[33] Eitan Altman,et al. Generalized Nash Bargaining Solution for bandwidth allocation , 2006, Comput. Networks.
[34] David K. Y. Yau,et al. Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach , 2006, IEEE/ACM Transactions on Networking.
[35] Xiapu Luo,et al. Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[36] Aleksandar Kuzmanovic,et al. Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.
[37] Xiapu Luo,et al. Novel approaches to end-to-end packet reordering measurement , 2005, IMC '05.
[38] Xiapu Luo,et al. Optimizing the pulsing denial-of-service attacks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[39] Xiapu Luo,et al. On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.
[40] Jia Wang,et al. Locating internet bottlenecks: algorithms, measurements, and implications , 2004, SIGCOMM '04.