On Designing and Reconfiguring k-Fault-Tolerant Tree Architectures
IEEE Transactions on Computers
Designing fault-tolerant systems using automorphisms
Journal of Parallel and Distributed Computing
Optimal Distance Networks of Low Degree for Parallel Computers
IEEE Transactions on Computers
Some Practical Issues in the Design of Fault-Tolerant Multiprocessors
IEEE Transactions on Computers - Special issue on fault-tolerant computing
IEEE/ACM Transactions on Networking (TON)
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Distributed Algorithms
Connective Fault Tolerance in Multiple-Bus Systems
IEEE Transactions on Parallel and Distributed Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Tolerant Switched Local Area Networks
IPPS '98 Proceedings of the 12th. International Parallel Processing Symposium on International Parallel Processing Symposium
Tolerating denial-of-service attacks using overlay networks: impact of topology
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A Graph Model for Fault-Tolerant Computing Systems
IEEE Transactions on Computers
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
In this paper we examine the effectiveness of a circulant graph proxy-network overlay topology. We select to examine a circulant graph that exhibits several attributes which strengthen the proxy network's resistance to DoS attacks. Proxy networks enable applications to communicate with users without disclosing their IP's. An application's resistance to DoS attacks is improved by hiding it behind a proxy-network based overlay. We evaluate the selected topology's fault-tolerance and its effectiveness in the resistance of DoS attacks.