Towards a more functional and secure network infrastructure (2003)

Cached

Download Links

by Daniel Adkins , Karthik Lakshminarayanan , Adrian Perrig , Ion Stoica , Daniel Adkins , Karthik Lakshminarayanan , Adrian Perrig , Ion Stoica
Citations:40 - 8 self

Documents Related by Co-Citation

114 Mayday: Distributed Filtering for Internet Services – David G. Andersen - 2003
212 SOS: Secure overlay services – Angelos D. Keromytis, Vishal Misra, Dan Rubenstein - 2002
3439 Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications – Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan - 2001
323 Internet Indirection Infrastructure – Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana - 2002
58 Taming IP packet flooding attacks – Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica - 2003
2673 A Scalable Content-Addressable Network – Sylvia Ratnasamy , Paul Francis, Mark Handley, Richard Karp, Scott Shenker - 2001
123 Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation – David J. Fried, Isaac Graf, Joshua W. Haines, Kristopher R. Kendall, David Mcclung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunningham, Marc A. Zissman - 2000
109 Analysis of a Denial of Service Attack on TCP – Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni - 1997
248 Controlling high bandwidth aggregates in the network – Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker - 2002
16 Tolerating denial-of-service attacks using overlay networks – impact of overlay network topology – Ju Wang - 2003
522 Predicting Internet Network Distance with Coordinates-Based Approaches – T. S. Eugene Ng, Hui Zhang - 2001
3 Akamai Technology Overview – Akamai
985 Resilient Overlay Networks – David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris - 2001
314 Inferring Internet Denial-of-Service Activity – David Moore, Geoffrey Voelker, Stefan Savage - 2001
476 Overcast: Reliable Multicasting with an Overlay Network – John Jannotti, David K. Gifford, Kirk L. Johnson, M. Frans Kaashoek, James W. O'Toole, Jr., M. Frans, Kaashoek James - 2000
1099 A Case for End System Multicast – Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan, Hui Zhang - 2000
770 Incentives Build Robustness in BitTorrent – Bram Cohen - 2003
5 Red II:" Another Worm Exploiting Buffer Overflow – Code CERT - 2001
7 The DoS Project's "trinoo" distributed denial of service attack tool – D Dittrich - 1999