Mayday: Distributed Filtering for Internet Services

@inproceedings{Andersen2003MaydayDF,
  title={Mayday: Distributed Filtering for Internet Services},
  author={David G. Andersen},
  booktitle={USENIX Symposium on Internet Technologies and Systems},
  year={2003}
}
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentication and protocol verification, and then relay the requests to a protected server. The server is protected from outside attack by simple packet filtering rules that can be efficiently deployed even in backbone routers. Mayday generalizes earlier work on Secure Overlay Services. Mayday improves upon this prior work by… CONTINUE READING
Highly Influential
This paper has highly influenced 22 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 256 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 177 extracted citations

A moving target DDoS defense mechanism

Computer Communications • 2014
View 9 Excerpts
Highly Influenced

MOTAG: Moving Target Defense against Internet Denial of Service Attacks

2013 22nd International Conference on Computer Communication and Networks (ICCCN) • 2013
View 10 Excerpts
Highly Influenced

Countering DoS attacks with stateless multipath overlays

ACM Conference on Computer and Communications Security • 2005
View 5 Excerpts
Highly Influenced

Keeping Denial-of-Service Attackers in the Dark

IEEE Transactions on Dependable and Secure Computing • 2005
View 5 Excerpts
Highly Influenced

Agile virtualized infrastructure to proactively defend against cyber attacks

2015 IEEE Conference on Computer Communications (INFOCOM) • 2015
View 4 Excerpts
Highly Influenced

257 Citations

02040'03'06'10'14'18
Citations per Year
Semantic Scholar estimates that this publication has 257 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 29 references

Convergence of security and network performance (vantage system overview)

ASTA NETWORKS
http://www.astanetworks.com/products/ data_sheets/asta_data_sheet.pdf • 2002
View 1 Excerpt

Peakflow for enterprises datasheet

ARBOR NETWORKS
http://arbornetworks.com/up_media/up_ files/Pflow_Enter_datasheet2.1.pdf% • 2002
View 2 Excerpts

Secure overlay services

A. D. KEROMYTIS, V. MISRA
Proc . ACM SIGCOMM • 2002

Similar Papers

Loading similar papers…