Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach
Abstract
Keywords
Full Text:
PDFReferences
M.J. Atallah, M. Blanton, and K.B. Frikken, “IncorporatingTemporal Capabilities in Existing Key Management Schemes,”Proc.12th European Symp. Research in Computer Security (ESORICS),2007.
J.K.B. Zhao and A. Joseph, “Tapestry: An Infrastructure for Fault-Tolerance Wide-Area Location and Routing,” Technical ReportUCB/CSD-01-1141, Univ. of California, Berkeley, 2001.
Cohen and D. Jefferson, “Protection in the Hydra OperatingSystem,” Proc. Fifth ACM Symp. Operating System Principles (SOSP),1975.
Dabek, M.F. Kaashoek, D. Karger, R. Morris, and I. Stoica,“Wide-Area Cooperative Storage with CFS,” Proc. 18th ACMSymp. Operating System Principles (SOSP ’01), Oct. 2001.
R. Droms, Dynamic Host Configuration Protocol, IETF RFC 2131,http://www.faqs.org/rfcs/rfc2131.html, 2008.
D. Eastlake and P. Jones, US Secure Hash Algorithm I, IETF RFC3174, http://www.ietf.org/rfc/rfc3174.txt, 2001.
Aspectj Compiler, Eclipse, http://eclipse.org/aspectj, 2008.
Data Encryption Standard (DES), FIPS, http://www.itl.nist.gov/fipspubs/fip46-2.htm, 2008.
The Gnutella Home Page, Gnutella, http://gnutella.wego.com/,2008.
E.J. Goh, H. Shacham, N. Modadugu, and D. Boneh, “SiRiUS:Securing Remote Untrusted Storage,” Proc. 10th Ann. Network andDistributed System Security Symp. (NDSS), 2003.
T. Jaeger and A.D. Rubin, “Preserving Integrity in Remote FileLocation and Retrieval,” Proc. Ann. Network and Distributed SystemSecurity Symp. (NDSS), 1996.
Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure OverlayServices,” Proc. ACM SIGCOMM, 2002.
H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing forMessage Authentication, IETF RFC 2104, http://www.faqs.org/rfcs/rfc2104.html, 2008.
J. Kubiatowics, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton,D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer,C. Wells, and B. Zhao, “OceanStore: An Architecture forGlobal-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Archi¬tectural Support for Programming Languages and OperatingSystems (ASPLOS ’00), Nov. 2000.
The Caesar Cipher, MathWorld, http://www.mathworld.com, 2008.
Shannon Entropy, MathWorld, http://mathworld.wolfram.com/Entropy.html, 2008.
AES: Advanced Encryption Standard, NIST, http://csrc.nist.gov/CryptoToolkit/aes/, 2008.
OpenSSL, OpenSSL,http://www.openssl.org/, 2008.
OpenSSL, Timing-Based Attacks on RSA Keys,http://www.openssl.org/news/secadv_20030317.txt, 2008.
S. Rafaeli and D. Hutchison, “A Survey of Key Managementfor Secure Group Communication,” J. ACM Computing Surveys,vol. 35, no. 3, 2003.
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker,“A Scalable Content-Addressable Network,” Proc. ACMSIGCOMM ’01, Aug. 2001.
R. Rivest, The MD5 Message-Digest Algorithm, IETF RFC 1321,http://www.ietf. org/rfc/rfc1321.txt,1992.
Rowstron and P. Druschel, “Pastry: Scalable, DistributedObject Location and Routing for Large-Scale Peer-to-PeerSystems,” Proc. 18th IFIP/ACM Int’l Conf. Distributed SystemsPlatforms (Middleware ’01), Nov. 2001.
Singh and M. Srivatsa, “Apoidea: Decentralized P2P WebCrawling,” Proc. SIGIR Workshop Distributed Information Retrieval,2003.
M. Srivatsa and L. Liu, “Vulnerabilities and Security Issues inStructured Overlay Networks: A Quantitative Analysis,” Proc.20th Ann. Computer Security Applications Conf. (ACSAC), 2004.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.