scispace - formally typeset
E

Erik Kline

Researcher at Information Sciences Institute

Publications -  13
Citations -  81

Erik Kline is an academic researcher from Information Sciences Institute. The author has contributed to research in topics: Testbed & Heuristics. The author has an hindex of 4, co-authored 13 publications receiving 63 citations. Previous affiliations of Erik Kline include University of Southern California & University of California, Los Angeles.

Papers
More filters
Proceedings ArticleDOI

Shield: DoS filtering using traffic deflecting

TL;DR: A novel method is introduced allowing a small number of deployed DoS defenses to act as secure on-demand shields for any node on the Internet, based on rerouting any packet addressed to a protected autonomous system (AS) through an intermediate filtering node — a shield.
Proceedings ArticleDOI

RAD: Reflector Attack Defense Using Message Authentication Codes

TL;DR: Tests show that Local RAD is better than the no-defense case, but gets overwhelmed when the attack exceeds the target's network capacity, while Core-deployed RAD successfully handles attacks of all rates.
Proceedings ArticleDOI

Securing data through avoidance routing

TL;DR: This paper proposes and design a system that allows users to specify regions of the Internet they wish their data to avoid and describes the deployment, performance and security issues of this system, along with alternative approaches that could be used.
Proceedings ArticleDOI

Data Tethers: Preventing information leakage by enforcing environmental data access policies

TL;DR: Data Tethers provides flexible environmental policies, which can be attached to data, specifying security requirements that must be met before accessing that data, implemented by dynamic recompilation of legacy applications without the need to recompile from source.
Proceedings ArticleDOI

Cybersecurity Experimentation at Program Scale: Guidelines and Principles for Future Testbeds

TL;DR: The experimentation life-cycle for two large scale research efforts that span multiple technologies are reviewed, and salient aspects of each cybersecurity program are identified, and guidelines based on eight years of experience are captured.