In the current Internet, senders are not accountable for the packets they send. As a result, malicious users send unwanted traffic that wastes shared resources and degrades network performance. Stopping such attacks requires identifying the responsible principal and filtering any unwanted traffic it sends. However, senders can obscure their identity: a packet identifies its sender only by the source address, but the Internet Protocol does not enforce that this address be correct. Additionally, affected destinations have no way to prevent the sender from continuing to cause harm. An accountable network binds sender identities to packets they send for the purpose of holding senders responsible for their traffic. In this dissertation, I ...
This dissertation concerns adding resource accountability to a simplex internetwork such as the Inte...
Denial-of-service (DoS) attacks are a serious problem affecting the Internet today with security fir...
Both malicious and non-malicious faults can dismantle computer networks. Thus, mitigating faults at ...
In the current Internet architecture, traffic is commonly routed to its destination using DNS names ...
This paper presents proposals for limiting malicious network traffic on the Internet infrastructure ...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Part 1: Network SecurityInternational audienceForwarding accountability mechanisms pinpoint the send...
It is well known that distributed denial of service attacks are a major threat to the Internet today...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Today’s IP network layer provides little to no protec-tion against misconfiguration or malice. Despi...
This architecture is collusion proof, requires relatively high computational capacity in the source ...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
This dissertation concerns adding resource accountability to a simplex internetwork such as the Inte...
Denial-of-service (DoS) attacks are a serious problem affecting the Internet today with security fir...
Both malicious and non-malicious faults can dismantle computer networks. Thus, mitigating faults at ...
In the current Internet architecture, traffic is commonly routed to its destination using DNS names ...
This paper presents proposals for limiting malicious network traffic on the Internet infrastructure ...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Part 1: Network SecurityInternational audienceForwarding accountability mechanisms pinpoint the send...
It is well known that distributed denial of service attacks are a major threat to the Internet today...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Today’s IP network layer provides little to no protec-tion against misconfiguration or malice. Despi...
This architecture is collusion proof, requires relatively high computational capacity in the source ...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
This dissertation concerns adding resource accountability to a simplex internetwork such as the Inte...
Denial-of-service (DoS) attacks are a serious problem affecting the Internet today with security fir...
Both malicious and non-malicious faults can dismantle computer networks. Thus, mitigating faults at ...