Practical intrusion-tolerant networks

D Obenshain, T Tantillo, A Babay… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …

Defending against eclipse attacks on overlay networks

A Singh, M Castro, P Druschel… - Proceedings of the 11th …, 2004 - dl.acm.org
Overlay networks are widely used to deploy functionality at edge nodes without changing
network routers. Each node in an overlay network maintains pointers to a set of neighbor …

[引用][C] Overlay networks: overview, applications and challenges

J Galán-Jiménez, A Gazo-Cervero - IJCSNS, 2010

Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments

X Wang, Z Liu, Q Li, Y Guo, S Ling, J Zhan… - arXiv preprint arXiv …, 2023 - arxiv.org
The Internet inter-domain routing system is vulnerable. On the control plane, the de facto
Border Gateway Protocol (BGP) does not have built-in mechanisms to authenticate routing …

Autonomic overlay network architecture

I Aloqily, A Karmouch - Autonomic Network Management …, 2010 - books.google.com
The growth of the Internet in terms of size and speed, as well as the flood of network
applications and services that have been deployed in the last few years, is indicative of a …

Virtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments

DI Wolinsky, K Lee, TW Choi, PO Boykin… - arXiv preprint arXiv …, 2010 - arxiv.org
Structured P2P overlays provide a framework for building distributed applications that are
self-configuring, scalable, and resilient to node failures. Such systems have been …

Vulnerabilities and security threats in structured overlay networks: A quantitative analysis

M Srivatsa, L Liu - 20th Annual Computer Security Applications …, 2004 - ieeexplore.ieee.org
A number of recent applications have been built on distributed hash tables (DHTs) based
overlay networks. Almost all DHT-based schemes employ a tight deterministic data …

On the design and implementation of IP-over-P2P overlay virtual private networks

K Subratie, S Aditya, V Daneshmand… - IEICE Transactions …, 2020 - search.ieice.org
The success and scale of the Internet and its protocol IP has spurred emergent distributed
technologies such as fog/edge computing and new application models based on distributed …

Resilience of blockchain overlay networks

A Paphitis, N Kourtellis, M Sirivianos - International Conference on …, 2023 - Springer
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an
alternative to centralized services and promise robustness to coordinated attacks. However …

Pushback for Overlay Networks: Protecting against Malicious Insiders

A Stavrou, ME Locasto, AD Keromytis - … , ACNS 2008, New York, NY, USA …, 2008 - Springer
Abstract Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized
services. Although resilient to external Denial of Service attacks, overlay networks can be …