2010
DOI: 10.1007/s10922-010-9168-7
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Automatic Configuration of Complex IPsec-Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…In particular, at least for structures like CAN, Chord, Kademlia, Butterfly graphs, and entangled networks such partitions can easily be ruled out. Also, our VPN system [1] does not construct such partitions and therefore a synchronization can be guaranteed.…”
Section: Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, at least for structures like CAN, Chord, Kademlia, Butterfly graphs, and entangled networks such partitions can easily be ruled out. Also, our VPN system [1] does not construct such partitions and therefore a synchronization can be guaranteed.…”
Section: Proofmentioning
confidence: 99%
“…Thus, VPNs can now be optimized with respect to the previously unaddressed DoS resistance. A fully automated system for a distributed VPN configuration is described in [1]. The approach proposes that all VPN gateways communicate via a peer-to-peer overlay structure with proactively established connections to scale with the number of nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In structured overlay networks, just like the VPN auto-configuration system in [18], this typically means that every node has about O(log n) possible mediators to choose from, where n denotes the size of the overlay.…”
Section: Scalable Construction Of Backup Pathsmentioning
confidence: 99%
“…A possible mitigation path is the usage of dynamically reconfiguring VPN approaches [18] that are able to repair associations in the case of DoS attacks, i.e., by allowing administrators to quickly relocate affected systems to different IP address ranges or redirecting traffic over different parts of the network. Furthermore, the unsuccessful attacks of the hacker group "Anonymous" on the Amazon compute centers [13] showed that conventional DoS attacks can be coped with, if precautions are taken.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, Secure OverLay for IPsec Discovery (SOLID) [3] employs a self-maintaining VPN with distinct mechanisms for discovery, routing, and topology control. Especially the latter is important as the setup of VPN tunnels is rather resource-and time-intensive (several seconds per tunnel if smartcards are used).…”
mentioning
confidence: 99%