Part 1: Network SecurityInternational audienceForwarding accountability mechanisms pinpoint the sending/forwarding properties of traffic to the entities that send and forward the traffic along a path. In this paper, we take flooding attacks as a use case and describe a proposal to hold senders accountable for the sending rates of their flows. Furthermore, we describe the corresponding challenges, potential solutions, and briefly present the literature in the area of forwarding accountability
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Abstract—Designing infrastructures that give untrusted thirdparties (such as end-hosts) control over...
In opportunistic networks, the probability of encountering a destination node is popularly used to s...
In the current Internet, senders are not accountable for the packets they send. As a result, malici...
This paper presents proposals for limiting malicious network traffic on the Internet infrastructure ...
We propose that accountability be a first-class network ser-vice, independent of addressing and rout...
This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve pe...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
In this paper, we present a measurement study of persistent forwarding loops and a flooding attack t...
Data transfer in ad hoc environments shows poor network performance due to frequent link breakages a...
Network coding has attracted the attention of many researchers in security and cryptography. In this...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In partic...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Abstract—Designing infrastructures that give untrusted thirdparties (such as end-hosts) control over...
In opportunistic networks, the probability of encountering a destination node is popularly used to s...
In the current Internet, senders are not accountable for the packets they send. As a result, malici...
This paper presents proposals for limiting malicious network traffic on the Internet infrastructure ...
We propose that accountability be a first-class network ser-vice, independent of addressing and rout...
This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve pe...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
In this paper, we present a measurement study of persistent forwarding loops and a flooding attack t...
Data transfer in ad hoc environments shows poor network performance due to frequent link breakages a...
Network coding has attracted the attention of many researchers in security and cryptography. In this...
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the I...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its bi...
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In partic...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Abstract—Designing infrastructures that give untrusted thirdparties (such as end-hosts) control over...
In opportunistic networks, the probability of encountering a destination node is popularly used to s...