메뉴 건너뛰기




Volumn 31, Issue 3, 2001, Pages 38-47

An analysis of using reflectors for distributed denial-of-service attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0003375670     PISSN: 01464833     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/505659.505664     Document Type: Article
Times cited : (301)

References (27)
  • 3
    • 0004194675 scopus 로고    scopus 로고
    • Internet Draft, March
    • S. Bellovin, "ICMP Traceback Messages," Internet Draft, http://www.research.att.com/~smb/ papers/draft-bellovin-itrace-00.txt, March 2000.
    • (2000) ICMP Traceback Messages
    • Bellovin, S.1
  • 7
    • 52649126844 scopus 로고    scopus 로고
    • CERT Advisory CA-1997-27, December
    • CERT Coordination Center, "FTP Bounce," CERT Advisory CA-1997-27, http://www.cert.org/ advisories/CA-1997-27.html,December 1997.
    • (1997) FTP Bounce
  • 10
    • 0039178118 scopus 로고    scopus 로고
    • Gnutella, http://gnutella.wego.com, 2000.
    • (2000)
  • 12
    • 0039178119 scopus 로고    scopus 로고
    • private communication, February
    • P. Metzger, private communication, February 2000.
    • (2000)
    • Metzger, P.1
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks 31(23-24), pp. 2435-2463, December 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 27
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • April
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM, April 2001.
    • (2001) Proc. IEEE INFOCOM
    • Song, D.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.