Identifying Interest Flooding in Named Data Networking
暂无分享,去创建一个
Jianqiang Tang | Hongke Zhang | Ying Liu | Zhongyue Zhang | Y. Liu | Hongke Zhang | Jianqiang Tang | Zhongyue Zhang
[1] Deborah Estrin,et al. Named Data Networking (NDN) Project , 2010 .
[2] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[3] Priya Mahadevan,et al. Interest flooding attack and countermeasures in Named Data Networking , 2013, 2013 IFIP Networking Conference.
[4] Mauro Conti,et al. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[5] Gene Tsudik,et al. DoS and DDoS in Named Data Networking , 2012, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[6] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[7] H. Jonathan Chao,et al. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks , 2006, IEEE Transactions on Dependable and Secure Computing.
[8] Diego Perino,et al. A reality check for content centric networking , 2011, ICN '11.
[9] Bin Liu,et al. Mitigate DDoS attacks in NDN by interest traceback , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[10] Tobias Lauinger,et al. Security & Scalability of Content-Centric Networking , 2010 .