Securing internet applications from routing attacks.
Yixin SunMaria ApostolakiHenry Birge-LeeLaurent VanbeverJennifer RexfordMung ChiangPrateek MittalPublished in: Commun. ACM (2021)
Keyphrases
- secure routing
- countermeasures
- information security
- routing protocol
- routing algorithm
- network topology
- traffic analysis
- watermarking scheme
- shortest path
- malicious attacks
- malicious users
- routing problem
- watermarking algorithm
- ip networks
- denial of service attacks
- ad hoc networks
- mobile agents
- security threats
- internet traffic
- security mechanisms
- terrorist attacks
- chosen plaintext
- security protocols
- watermarking technique
- response time
- biological inspired