Using overlays to improve network security

  title={Using overlays to improve network security},
  author={A. Keromytis and V. Misra and Daniel Rubenstein},
  booktitle={SPIE ITCom},
  • A. Keromytis, V. Misra, Daniel Rubenstein
  • Published in SPIE ITCom 2002
  • Engineering
  • As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work… CONTINUE READING
    16 Citations
    Cooperative Mechanism Against DDoS Attacks
    • 17
    • PDF
    Challenges and Principles of DDoS Defense paper
    • 2003
    • 19
    Secure Overlay Services (SOS): A critical analysis
    • 4
    A defense system on ddos attacks in mobile ad hoc networks
    • 10
    Cooperative Defence Against DDoS Attacks
    • 58
    • PDF
    Cooperative detection and protection against network attacks using decentralized information sharing
    • 25
    Distributed Defense Against DDoS Attacks
    • 50
    • PDF
    Exploring DDoS Defense Mechanisms
    • 5
    • PDF


    SOS: secure overlay services
    • 536
    • PDF
    Network support for IP traceback
    • 728
    • PDF
    Practical network support for IP traceback
    • 1,056
    • PDF
    Analysis of a denial of service attack on TCP
    • 510
    • PDF
    Anonymous connections and onion routing
    • 899
    • PDF
    Attack class: address spoofing
    • 71
    • PDF
    A Security Architecture for the Internet Protocol
    • 1,405
    • PDF
    A case for end system multicast
    • 1,983
    • PDF
    The end-to-end effects of Internet path selection
    • 577
    • PDF