Chuat et al., 2022 - Google Patents
Availability GuaranteesChuat et al., 2022
- Document ID
- 16059492140160259474
- Author
- Chuat L
- Legner M
- Basin D
- Hausheer D
- Hitz S
- Müller P
- Perrig A
- Publication year
- Publication venue
- The Complete Guide to SCION: From Design Principles to Formal Verification
External Links
Snippet
As we argue in Chapter 7, the most fundamental requirement for any networking architecture is to be available: It is trivial to design a perfectly secure but unavailable network by simply cutting all connections or dropping all packets. Unfortunately, the current Internet falls short …
- 241001583810 Colibri 0 description 86
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Fang | Security framework for MPLS and GMPLS networks | |
| Ioannidis et al. | Implementing pushback: Router-based defense against DDoS attacks | |
| Lee et al. | CoDef: Collaborative defense against large-scale link-flooding attacks | |
| Abliz | Internet denial of service attacks and defense mechanisms | |
| Bremler-Barr et al. | Spoofing prevention method | |
| Yang et al. | A DoS-limiting network architecture | |
| EP1284573B1 (en) | Method and apparatus for protecting Internet-connected sites from denial-of-service attacks | |
| Douligeris et al. | Network security: current status and future directions | |
| Ramanathan et al. | SENSS against volumetric DDoS attacks | |
| US20040196843A1 (en) | Protection of network infrastructure and secure communication of control information thereto | |
| Tschofenig et al. | Security Threats for Next Steps in Signaling (NSIS) | |
| WO2008147302A1 (en) | Method and apparatus for protecting the routing of data packets | |
| US20150207729A1 (en) | Tying data plane paths to a secure control plane | |
| Hsiao et al. | STRIDE: sanctuary trail--refuge from internet DDoS entrapment | |
| Yao et al. | VASE: Filtering IP spoofing traffic with agility | |
| Shi et al. | OverDoSe: A generic DDoS protection service using an overlay network | |
| EP3000207B1 (en) | Method for operating a network and a network | |
| Fang | Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs) | |
| Furfaro et al. | Modelling and simulation of a defense strategy to face indirect DDoS flooding attacks | |
| Wyss et al. | Zero-setup intermediate-rate communication guarantees in a global internet | |
| US20090122784A1 (en) | Method and device for implementing the security of the backbone network | |
| Chuat et al. | Availability Guarantees | |
| Wyss et al. | DoCile: Taming denial-of-capability attacks in inter-domain communications | |
| Bavosa | GPRS security threats and solution recommendations | |
| Hong et al. | PBS: Signaling architecture for network traffic authorization |