Protecting internet infrastructure against link flooding attacks: A techno-economic perspective

[1]  J. Nash THE BARGAINING PROBLEM , 1950, Classics in Game Theory.

[2]  Dieter Kratsch,et al.  Space-Efficient Biconnected Components and Recognition of Outerplanar Graphs , 2016, Algorithmica.

[3]  Lei Xue,et al.  LinkScope: Toward Detecting Target Link Flooding Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[4]  Xiapu Luo,et al.  SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[5]  Xenofontas A. Dimitropoulos,et al.  A novel framework for modeling and mitigating distributed link flooding attacks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[6]  Xenofontas A. Dimitropoulos,et al.  On the Interplay of Link-Flooding Attacks and Traffic Engineering , 2016, CCRV.

[7]  Dan Wang,et al.  TDS: Time-dependent sponsored data plan for wireless data traffic market , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[8]  L. Xia,et al.  Developments in Research on Pricing on the Internet , 2016 .

[9]  Vyas Sekar,et al.  SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks , 2016, NDSS.

[10]  Mehmet Simsek A new metric for flow-level filtering of low-rate DDoS attacks , 2015, Secur. Commun. Networks.

[11]  Ufuk Topcu,et al.  An approximately truthful mechanism for electric vehicle charging via joint differential privacy , 2015, 2015 American Control Conference (ACC).

[12]  Lei Xue,et al.  Towards Detecting Target Link Flooding Attack , 2014, LISA.

[13]  Virgil D. Gligor,et al.  Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures , 2014, CCS.

[14]  Dan Wang,et al.  Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[15]  Leandros Tassiulas,et al.  Bargaining-Based Mobile Data Offloading , 2014, IEEE Journal on Selected Areas in Communications.

[16]  Tiankui Zhang,et al.  Opportunistic User Association for Multi-Service HetNets Using Nash Bargaining Solution , 2014, IEEE Communications Letters.

[17]  Xiapu Luo,et al.  Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[18]  Aaron Roth,et al.  Mechanism design in large games: incentives and privacy , 2012, ITCS.

[19]  Amir Herzberg,et al.  Bandwidth Distributed Denial of Service: Attacks and Defenses , 2014, IEEE Security & Privacy.

[20]  Virgil D. Gligor,et al.  CoDef: collaborative defense against large-scale link-flooding attacks , 2013, CoNEXT.

[21]  Jinjun Chen,et al.  A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..

[22]  Virgil D. Gligor,et al.  The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.

[23]  Richard T. B. Ma,et al.  On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation , 2013, Comput. Networks.

[24]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[25]  Weifeng Chen,et al.  Flow level detection and filtering of low-rate DDoS , 2012, Comput. Networks.

[26]  Lixia Zhang,et al.  Explaining BGP Slow Table Transfers , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[27]  Noam Nisan,et al.  Incentive-compatible distributed greedy protocols , 2011, PODC '11.

[28]  Aziz Mohaisen,et al.  Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.

[29]  Adrian Perrig,et al.  The Coremelt Attack , 2009, ESORICS.

[30]  Xiapu Luo,et al.  Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring , 2009, USENIX Annual Technical Conference.

[31]  John C. S. Lui,et al.  Mathematical modeling of incentive policies in p2p systems , 2008, NetEcon '08.

[32]  Ying Zhang,et al.  Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing , 2007, NDSS.

[33]  Eitan Altman,et al.  Generalized Nash Bargaining Solution for bandwidth allocation , 2006, Comput. Networks.

[34]  David K. Y. Yau,et al.  Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach , 2006, IEEE/ACM Transactions on Networking.

[35]  Xiapu Luo,et al.  Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[36]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.

[37]  Xiapu Luo,et al.  Novel approaches to end-to-end packet reordering measurement , 2005, IMC '05.

[38]  Xiapu Luo,et al.  Optimizing the pulsing denial-of-service attacks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[39]  Xiapu Luo,et al.  On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.

[40]  Jia Wang,et al.  Locating internet bottlenecks: algorithms, measurements, and implications , 2004, SIGCOMM '04.