Ingress Filtering for Multihomed Networks, RFC, vol.3704, 2004. ,
Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, Internet Measurement Conference, 2009. ,
The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet, USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, 2005. ,
, CAIDA: The Spoofer Project
,
AS relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review, vol.37, issue.1, pp.29-40, 2007. ,
The Menlo Report: Ethical Principles Guiding Information and, 2012. ,
, ZMap: Fast Internet-wide Scanning and Its Security Applications. In: USENIX Security Symposium, 2013.
It's the End of the Cache as We Know It ,
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates, Internet Measurement Conference, 2016. ,
, DDoS Incident Report
, BGP Prefix Delegations: A Deep Dive. In: Internet Measurement Conference, pp.469-475, 2016.
Going Wild: Large-Scale Classification of Open DNS Resolvers, Internet Measurement Conference, 2015. ,
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks, USENIX Conference on Security Symposium, 2014. ,
Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses, Internet Measurement Conference, 2017. ,
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer, Traffic Monitoring and Analysis Conference, 2018. ,
Using Loops Observed in Traceroute to Infer the Ability to Spoof, Passive and Active Measurement Conference, 2017. ,
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet, Computer and Communications Security Conference (CCS), 2019. ,
, Spoofing ASNs
, Conference on Emerging Networking Experiments And Technologies (CoNEXT), pp.96-109, 2019.
Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Network and Distributed System Security Symposium (NDSS), 2014. ,
The Unintended Consequences of Email Spam Prevention, Passive and Active Measurement, 2018. ,
Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, 2000. ,
Resolvers Revealed: Characterizing DNS Resolvers and their Clients, ACM Transactions on Internet Technology, 2013. ,
Dynamic Updates in the Domain Name System (DNS UPDATE), Internet RFC, p.2136, 1997. ,