2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) 2020
DOI: 10.1109/ipccc50635.2020.9391554
|View full text |Cite
|
Sign up to set email alerts
|

SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…A more general view of attack mitigation that includes several DDoS attacks have been presented in [104], [105], [106]. Considering the source of traffic, a proactive approach of source address validation has been considered in [107], while the study in [108], [109], [110] detects and drops spoofed traffic. Some specific cases have also been considered.…”
Section: A Ddos Attack Mitigationmentioning
confidence: 99%
See 4 more Smart Citations
“…A more general view of attack mitigation that includes several DDoS attacks have been presented in [104], [105], [106]. Considering the source of traffic, a proactive approach of source address validation has been considered in [107], while the study in [108], [109], [110] detects and drops spoofed traffic. Some specific cases have also been considered.…”
Section: A Ddos Attack Mitigationmentioning
confidence: 99%
“…3) Security of Source of the Traffic: The studies in [107], [108], [109], [110] consider the security for the source of the traffic. While [107] advocates a proactive strategy for source address validation, the studies in [108], [109], [110] detect and drop spoofed traffic in a reactive manner.…”
Section: A Ddos Attack Mitigationmentioning
confidence: 99%
See 3 more Smart Citations