Bohacek et al., 2002 - Google Patents
Enhancing security via stochastic routingBohacek et al., 2002
View PDF- Document ID
- 17389663601795358908
- Author
- Bohacek S
- Hespanha J
- Obraczka K
- Lee J
- Lim C
- Publication year
- Publication venue
- Proceedings. Eleventh International Conference on Computer Communications and Networks
External Links
Snippet
Shortest path routing leaves connections at risk of interception and eavesdropping since the path over which data packets travel is fairly predictable and easy to determine. To improve routing security, we propose a proactive mechanism, which we call secure stochastic …
- 230000002708 enhancing 0 title abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bohacek et al. | Enhancing security via stochastic routing | |
| Abliz | Internet denial of service attacks and defense mechanisms | |
| Savage et al. | Network support for IP traceback | |
| Padmanabhan et al. | Secure traceroute to detect faulty or malicious routing | |
| Smith et al. | Securing the border gateway routing protocol | |
| Ballani et al. | Off by default! | |
| Wendlandt et al. | Don't Secure Routing Protocols, Secure Data Delivery. | |
| EP2345212B1 (en) | Method and apparatus for forwarding data packets using aggregating router keys | |
| CN101095321B (en) | Method of operating a network | |
| Bohacek et al. | Game theoretic stochastic routing for fault tolerance and security in computer networks | |
| Wong et al. | Network infrastructure security | |
| Barrera et al. | Scion five years later: Revisiting scalability, control, and isolation on next-generation networks | |
| Lam et al. | A coordinated detection and response scheme for distributed denial-of-service attacks | |
| Fallah et al. | TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks | |
| Gogineni et al. | MMS: An autonomic network-layer foundation for network management | |
| Kim et al. | A BGP attack against traffic engineering | |
| Bohacek et al. | Secure stochastic routing | |
| Shue et al. | Packet forwarding with source verification | |
| Bohacek et al. | NS-Evaluation of Secure Stochastic Routing | |
| Verma et al. | Analysis of border gateway protocol (bgp) with improvement in byzantine robustness | |
| Avramopoulos et al. | Stealth probing: Securing IP routing through data-plane security | |
| Kimiyama et al. | Autonomous and distributed internet security (AIS) infrastructure for safe internet | |
| Liu et al. | MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation | |
| Hu et al. | SAVT: A practical scheme for source address validation and traceback in campus network | |
| Zeb et al. | BGP Threats and Practical Security |