In this paper, we show that distributed systems are vul- nerable to routing attacks and propose an architecture to obviate this vulnerability. A somewhat surprising finding is that even a small-scale routing attack can completely dis- rupt the operation of a state-machine replication service. The architecture that we propose is based on the following simple ideas: (1) Circumvent the adversary if possible and (2) if it is not possible, relax the application semantics
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and at...
In an open distributed system, agents comprising an application must not only survive (possibly mali...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
The Internet’s interdomain routing protocol, BGP, supports a complex network of Autonomous Systems w...
This paper focuses on "router-based " defense mechanisms, and whether they can provide eff...
textAs the Internet becomes the ubiquitous infrastructure for various applications, demands on the r...
We present a solution to the denial of service prob-lem for routing infrastructures. When a network ...
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the com...
This paper focuses on router-based defense mechanisms, and whether they can provide effective solu...
To proactively defend against intruders from readily jeopardizing single-path data sessions, we prop...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
University of Minnesota Ph.D. dissertation.June 2016. Major: Computer Science. Advisor: Nicholas Ho...
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the com...
Designing routing schemes is a multidimensional and complex task that depends on the objective funct...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and at...
In an open distributed system, agents comprising an application must not only survive (possibly mali...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
The Internet’s interdomain routing protocol, BGP, supports a complex network of Autonomous Systems w...
This paper focuses on "router-based " defense mechanisms, and whether they can provide eff...
textAs the Internet becomes the ubiquitous infrastructure for various applications, demands on the r...
We present a solution to the denial of service prob-lem for routing infrastructures. When a network ...
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the com...
This paper focuses on router-based defense mechanisms, and whether they can provide effective solu...
To proactively defend against intruders from readily jeopardizing single-path data sessions, we prop...
Denial of service (DoS) attacks continue to threaten the reliability of networking systems. Previous...
University of Minnesota Ph.D. dissertation.June 2016. Major: Computer Science. Advisor: Nicholas Ho...
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the com...
Designing routing schemes is a multidimensional and complex task that depends on the objective funct...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and at...
In an open distributed system, agents comprising an application must not only survive (possibly mali...