[go: up one dir, main page]

Bohacek et al., 2002 - Google Patents

Enhancing security via stochastic routing

Bohacek et al., 2002

View PDF
Document ID
17389663601795358908
Author
Bohacek S
Hespanha J
Obraczka K
Lee J
Lim C
Publication year
Publication venue
Proceedings. Eleventh International Conference on Computer Communications and Networks

External Links

Snippet

Shortest path routing leaves connections at risk of interception and eavesdropping since the path over which data packets travel is fairly predictable and easy to determine. To improve routing security, we propose a proactive mechanism, which we call secure stochastic …
Continue reading at www.eecis.udel.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bohacek et al. Enhancing security via stochastic routing
Abliz Internet denial of service attacks and defense mechanisms
Savage et al. Network support for IP traceback
Padmanabhan et al. Secure traceroute to detect faulty or malicious routing
Smith et al. Securing the border gateway routing protocol
Ballani et al. Off by default!
Wendlandt et al. Don't Secure Routing Protocols, Secure Data Delivery.
EP2345212B1 (en) Method and apparatus for forwarding data packets using aggregating router keys
CN101095321B (en) Method of operating a network
Bohacek et al. Game theoretic stochastic routing for fault tolerance and security in computer networks
Wong et al. Network infrastructure security
Barrera et al. Scion five years later: Revisiting scalability, control, and isolation on next-generation networks
Lam et al. A coordinated detection and response scheme for distributed denial-of-service attacks
Fallah et al. TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks
Gogineni et al. MMS: An autonomic network-layer foundation for network management
Kim et al. A BGP attack against traffic engineering
Bohacek et al. Secure stochastic routing
Shue et al. Packet forwarding with source verification
Bohacek et al. NS-Evaluation of Secure Stochastic Routing
Verma et al. Analysis of border gateway protocol (bgp) with improvement in byzantine robustness
Avramopoulos et al. Stealth probing: Securing IP routing through data-plane security
Kimiyama et al. Autonomous and distributed internet security (AIS) infrastructure for safe internet
Liu et al. MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation
Hu et al. SAVT: A practical scheme for source address validation and traceback in campus network
Zeb et al. BGP Threats and Practical Security