Securing Phoenix Network Coordinate System: Difference between revisions

Jump to navigation Jump to search
Line 11: Line 11:


In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design.
In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design.
There are some existing NC security solutions [4][5] proposed in Vivaldi NC system, which could be our good reference.
== Reference ==
[http://www.springerlink.com/content/20qt876131833081/]
[planete.inria.fr/dabbous/publis/lsad06.pdf]
[portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf]
[micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf]
[www.springerlink.com/index/f348530225120185.pdf]
198

edits

Navigation menu