E
Erik Kline
Researcher at Information Sciences Institute
Publications - 13
Citations - 81
Erik Kline is an academic researcher from Information Sciences Institute. The author has contributed to research in topics: Testbed & Heuristics. The author has an hindex of 4, co-authored 13 publications receiving 63 citations. Previous affiliations of Erik Kline include University of Southern California & University of California, Los Angeles.
Papers
More filters
Proceedings ArticleDOI
Shield: DoS filtering using traffic deflecting
TL;DR: A novel method is introduced allowing a small number of deployed DoS defenses to act as secure on-demand shields for any node on the Internet, based on rerouting any packet addressed to a protected autonomous system (AS) through an intermediate filtering node — a shield.
Proceedings ArticleDOI
RAD: Reflector Attack Defense Using Message Authentication Codes
TL;DR: Tests show that Local RAD is better than the no-defense case, but gets overwhelmed when the attack exceeds the target's network capacity, while Core-deployed RAD successfully handles attacks of all rates.
Proceedings ArticleDOI
Securing data through avoidance routing
Erik Kline,Peter Reiher +1 more
TL;DR: This paper proposes and design a system that allows users to specify regions of the Internet they wish their data to avoid and describes the deployment, performance and security issues of this system, along with alternative approaches that could be used.
Proceedings ArticleDOI
Data Tethers: Preventing information leakage by enforcing environmental data access policies
TL;DR: Data Tethers provides flexible environmental policies, which can be attached to data, specifying security requirements that must be met before accessing that data, implemented by dynamic recompilation of legacy applications without the need to recompile from source.
Proceedings ArticleDOI
Cybersecurity Experimentation at Program Scale: Guidelines and Principles for Future Testbeds
Stephen Schwab,Erik Kline +1 more
TL;DR: The experimentation life-cycle for two large scale research efforts that span multiple technologies are reviewed, and salient aspects of each cybersecurity program are identified, and guidelines based on eight years of experience are captured.