최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE transactions on information forensics and security, v.16, 2021년, pp.3138 - 3153
Kim, Jinwoo (KAIST, School of Electrical Engineering, Daejeon, South Korea) , Nam, Jaehyun (AccuKnox, Cupertino, CA, USA) , Lee, Suyeol (KAIST, School of Electrical Engineering, Daejeon, South Korea) , Yegneswaran, Vinod (SRI International, Menlo Park, CA, USA) , Porras, Phillip (SRI International, Menlo Park, CA, USA) , Shin, Seungwon (KAIST, School of Electrical Engineering, Daejeon, South Korea)
The robustness of a network’s connectivity to other networks is often highly dependent on a few critical nodes and links that tie the network to the larger topology. The failure or degradation to such network bottlenecks can result in outages that may propagate throughout the network. Unfortu...
OpenFlow Switch Specification Version 1 2 2014
Freeman, Linton C.. A Set of Measures of Centrality Based on Betweenness. Sociometry, vol.40, no.1, 35-.
Spring, Neil, Mahajan, Ratul, Wetherall, David. Measuring ISP topologies with rocketfuel. Computer communication review, vol.32, no.4, 133-145.
A Practical Guide to (Correctly) Troubleshooting with Traceroute 2020
Planetlab 2020
OpenDaylight 2020
Proc Secur Symp USENIX A virtual honeypot framework provos 2004 1
Barabási, Albert-László, Bonabeau, Eric. Scale-Free Networks. Scientific american, vol.288, no.5, 60-69.
Albert, Réka, Jeong, Hawoong, Barabási, Albert-László. Error and attack tolerance of complex networks. Nature, vol.406, no.6794, 378-382.
Zheng, Jing, Li, Qi, Gu, Guofei, Cao, Jiahao, Yau, David K. Y., Wu, Jianping. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE transactions on information forensics and security, vol.13, no.7, 1838-1853.
Proc Secur Symp USENIX Bohatei: Flexible and elastic DDoS defense fayaz 2015 817
Ryu 2020
Open Vswitch 2020
Iperf3 2020
Traceroute For Linux 2006
Publ Math Inst Hung Acad Sci On the evolution of random graphs erd?s 1960 5 17
ONOS Master Experiment I—Single Bench Flow Latency Test 2020
Open Network Operating System (ONOS) 2020
Yegneswaran, V., Barford, P., Plonka, D.. On the Design and Use of Internet Sinks for Network Abuse Monitoring. Lecture notes in computer science, vol.3224, 146-165.
OpenFlow Configuration Guide Cisco IOS XE Gibraltar 2020
Proc Secur Symp USENIX The CrossPath attack: Disrupting the SDN control channel via shared links cao 2019 19
Proc Secur Symp USENIX NetHide: Secure and practical network topology obfuscation meier 2018 693
arXiv 1703 09521 Active link obfuscation to thwart link-flooding attacks for Internet of Things ding 2017
Holme, Petter, Kim, Beom Jun, Yoon, Chang No, Han, Seung Kee. Attack vulnerability of complex networks. Physical review. E, Statistical, nonlinear, and soft matter physics, vol.65, no.5, 056109-.
Magoni, D.. Tearing down the Internet. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.21, no.6, 949-960.
Studer, A., Perrig, A.. The Coremelt Attack. Lecture notes in computer science, vol.5789, 37-52.
Proc IEEE Symp Secur Privacy The crossfire attack kang 2013 127
Cohen, Reuven, Erez, Keren, ben-Avraham, Daniel, Havlin, Shlomo. Breakdown of the Internet under Intentional Attack. Physical review letters, vol.86, no.16, 3682-3685.
A Technical Report From Columbia University bellovin 2013
Large ddos attacks cause outages at twitter spotify and other sites 2016
Knight, S., Nguyen, H. X., Falkner, N., Bowden, R., Roughan, M.. The Internet Topology Zoo. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.29, no.9, 1765-1775.
Can a DDoS Break the Internet? Sure! Just Not all of it 2013
CloudFlare 2020
Open vSwitch NICIRA extension 2020
Pulp 2020
Broido, Anna D., Clauset, Aaron. Scale-free networks are rare. Nature communications, vol.10, no.1, 1017-.
Abilene Network 2005
ET Docker 2020
Albert, Réka, Barabási, Albert-László. Statistical mechanics of complex networks. Reviews of modern physics, vol.74, no.1, 47-97.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.