2009 European Conference on Computer Network Defense 2009
DOI: 10.1109/ec2nd.2009.14
|View full text |Cite
|
Sign up to set email alerts
|

Self-Routing Denial-of-Service Resistant Capabilities Using In-packet Bloom Filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 33 publications
(24 citation statements)
references
References 11 publications
1
23
0
Order By: Relevance
“…As previously mentioned, host-oriented attacks are avoided inherently by zFilters (a scalable and fast forwarding mechanism proposed in PSIRP) since link identifiers are not globally known. The DoF attack can be further prevented by the zFormation (Rothenberg et al, 2009) mechanism. The scalable security mechanism is applied to various components of PSIRP such as the rendezvous system, routing of subscriptions, and the actual payload traffic so as to protect the whole network.…”
Section: Existing Solutionsmentioning
confidence: 98%
“…As previously mentioned, host-oriented attacks are avoided inherently by zFilters (a scalable and fast forwarding mechanism proposed in PSIRP) since link identifiers are not globally known. The DoF attack can be further prevented by the zFormation (Rothenberg et al, 2009) mechanism. The scalable security mechanism is applied to various components of PSIRP such as the rendezvous system, routing of subscriptions, and the actual payload traffic so as to protect the whole network.…”
Section: Existing Solutionsmentioning
confidence: 98%
“…That is, when a link is assigned a LID, it keeps this LID forever. To overcome these limitations, the Z-formation approach is proposed in [17]. The main idea is to make zFilters expire after a certain time by periodically changing the LIDs.…”
Section: Security Enhancements To the Forwarding Planementioning
confidence: 99%
“…A Bloom filter with a maximum fill factor is called maximally filled and hence no more LIDs can be inserted. In [17] the Bloom filter is called a zFilter and we use this term throughout the paper.…”
mentioning
confidence: 99%
“…Credentials are issued by en-route routers on flow initiation and later verified on a packet-basis. Also based on in-packet Bloom filters (iBF), the self-routing capabilities in [119] enhance the security properties of LIPSIN [85] by using iBFs as forwarding identifiers that act simultaneously as path designators, i.e. define which path the packet should take, and as capabilities, i.e.…”
Section: E Securitymentioning
confidence: 99%