Detecting and Isolating Malicious Packet Losses
Abstract
Keywords
Full Text:
PDFReferences
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson, “Detecting and isolating malicious routers,” Procedure IEEE Security And Privacy (S&P ’98)
S. Cheung, “An efficient message authentication scheme for link state routing,” Computer Security Applications Conference (Acsac ’97), page to page 90-98
M.T. Goodrich, Denial of service attacks and counter strategies, Provisional Patent Filing
Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A secure on demand routing protocol for Ad Hoc Networks,”
S. Kent, C. Lynn, J. Mikkelson, and K. Seo, “Using conservation of flow in network protocols” IEEE J. Selected Areas In Communication, Volume 18, Number 4, Page to page 582-592
A.T. Mizrak, Y.-C. Cheng, K. Marzullo, And S. Savage, “Methods for detecting and isolating malicious routers,” IEEE Transanction dependable and secure computing, Volume 3, Number 3
B.R. Smith and J. Garcia-Luna-Aceves, “Measurement of temporal dependence in packet loss,” IEEE Global Internet
L. Subramanian, V. Roth, I. Stoica, S. Shenker, And R. Katz, “An efficient message authentication scheme,” Networked systems design and implementation (Nsdi ’04)
R. Thomas, ISP security Bof, Nanog 28, Http://www.nanog.org/Mtg-0306/pdf/Thomas.pdf
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.