A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
A survey of security attacks in information-centric networking
EG AbdAllah, HS Hassanein… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Information-centric networking (ICN) is a new communication paradigm that focuses on
content retrieval from a network regardless of the storage location or physical representation …
content retrieval from a network regardless of the storage location or physical representation …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Named data networking
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
Bohatei: Flexible and elastic {DDoS} defense
DDoS defense today relies on expensive and proprietary hardware appliances deployed at
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
Credit-scheduled delay-bounded congestion control for datacenters
Small RTTs (~ tens of microseconds), bursty flow arrivals, and a large number of concurrent
flows (thousands) in datacenters bring fundamental challenges to congestion control as they …
flows (thousands) in datacenters bring fundamental challenges to congestion control as they …
A data-oriented (and beyond) network architecture
T Koponen, M Chawla, BG Chun… - Proceedings of the …, 2007 - dl.acm.org
The Internet has evolved greatly from its original incarnation. For instance, the vast majority
of current Internet usage is data retrieval and service access, whereas the architecture was …
of current Internet usage is data retrieval and service access, whereas the architecture was …
Interest flooding attack and countermeasures in named data networking
A Afanasyev, P Mahadevan… - 2013 IFIP …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet,
where packets from a large number of compromised hosts thwart the paths to the victim site …
where packets from a large number of compromised hosts thwart the paths to the victim site …
FairCloud: Sharing the network in cloud computing
L Popa, G Kumar, M Chowdhury… - Proceedings of the …, 2012 - dl.acm.org
The network, similar to CPU and memory, is a critical and shared resource in the cloud.
However, unlike other resources, it is neither shared proportionally to payment, nor do cloud …
However, unlike other resources, it is neither shared proportionally to payment, nor do cloud …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …