Sciweavers

94 search results - page 1 / 19
» Losing control of the internet: using the data plane to atta...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Losing control of the internet: using the data plane to attack the control plane
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune...
IEEEARES
2009
IEEE
13 years 11 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
COMCOM
2006
93views more  COMCOM 2006»
13 years 5 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
AICT
2005
IEEE
102views Communications» more  AICT 2005»
13 years 10 months ago
An Overlay Data Plane for PlanetLab
PlanetLab has significantly lowered the barriers to deploying overlays. This paper describes how to lower them further by introducing a general data plane for overlay networks. R...
Andy C. Bavier, Mark Huang, Larry L. Peterson
HPCC
2005
Springer
13 years 10 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore