-
1
-
-
0038628641
-
-
Cert advisory ca-2000-01 denial-of-service developments; January
-
Cert advisory ca-2000-01 denial-of-service developments. http://www.cert.org/advisories/CA-2000-01.html, January 2000.
-
(2000)
-
-
-
2
-
-
0025603636
-
A policy model for denial of service
-
Franconia, NH USA, June; IEEE Computer Society Press
-
Edward Amoroso. A policy model for denial of service. In Proc. Computer Security Foundations Workshop III, pages 110-114, Franconia, NH USA, June 1990. IEEE Computer Society Press.
-
(1990)
Proc. Computer Security Foundations Workshop III
, pp. 110-114
-
-
Amoroso, E.1
-
3
-
-
0037614402
-
-
lcmp traceback messages
-
lcmp traceback messages. http://www.silicondefense.com/research/itrex/archive/tracing-papers/draft-bello vin-itrace-00.txt.
-
-
-
-
4
-
-
4244200046
-
Routing indexes for peer-to-peer systems
-
Technical report, Stanford Univ., CS Dept.
-
Arturo Crespo and Hector Garcia-Molina. Routing indexes for peer-to-peer systems. Technical report, Stanford Univ., CS Dept., 2001.
-
(2001)
-
-
Crespo, A.1
Garcia-Molina, H.2
-
6
-
-
0003302799
-
The free haven project: Distributed anonymous storage service
-
R. Dingledine, M. Freedman, and D. Molnar. The free haven project: distributed anonymous storage service. Proc. of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York (2001)., 2001.
-
(2001)
Proc. of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA. Springer: New York (2001)
-
-
Dingledine, R.1
Freedman, M.2
Molnar, D.3
-
7
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. In IETF RFC 2267, 1998.
-
(1998)
IETF RFC 2267
-
-
Ferguson, P.1
Senie, D.2
-
8
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
Computer; April
-
Lee Garber. Denial-of-service attacks rip the internet. Computer, 12-17, April 2000.
-
(2000)
, pp. 12-17
-
-
Garber, L.1
-
9
-
-
0037614421
-
Operating system support for quality of service
-
Ph. D. Thesis, University of Cambridge
-
E. A. Hyden. Operating system support for quality of service. Ph. D. Thesis, University of Cambridge, 1994.
-
(1994)
-
-
Hyden, E.A.1
-
10
-
-
0038289935
-
-
Kazaa home page
-
Kazaa home page. http://www.kazaa.com/.
-
-
-
-
13
-
-
0038289923
-
-
Limewire home page
-
Limewire home page. http://www.limewire.com/.
-
-
-
-
14
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant, web publishing system
-
Aviel D. Rubin, Marc Waldman, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security, August 2000.
-
Proc. 9th USENIX Security, August 2000
-
-
Rubin, A.D.1
Waldman, M.2
Faith Cranor, L.3
-
15
-
-
0038628626
-
-
Mojo nation technical overview home page
-
Mojo nation technical overview home page. http://www.mojonation.net/docs/technical_overview.shtml.
-
-
-
-
17
-
-
0037614428
-
-
Morpheus home page
-
Morpheus home page. http://www.musiccity.com.
-
-
-
-
18
-
-
0027711242
-
Denial of service
-
Fairfax, Virginia, November
-
R. M. Néedham. Denial of service. In Proc. 1st ACM CCS, pg 151-153, Fairfax, Virginia, November 1993.
-
(1993)
Proc. 1st ACM CCS
, pp. 151-153
-
-
Néedham, R.M.1
-
19
-
-
0028532812
-
Denial of service: An example
-
Roger M. Needham. Denial of service: an example. Comm. of the ACM, 37(11):42-46, 1994.
-
(1994)
Comm. of the ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
20
-
-
84966591863
-
Inside risks: Denial-of-service attacks
-
Peter G. Neumann. Inside risks: denial-of-service attacks. Comm. of the ACM, 43(4):136-136, 2000.
-
(2000)
Comm. of the ACM
, vol.43
, Issue.4
, pp. 136
-
-
Neumann, P.G.1
-
21
-
-
4244165280
-
Flow control algorithm for distributed 'broadcast-route' networks with reliable transport links
-
Flow control algorithm for distributed 'broadcast-route' networks with reliable transport links. http://www.grouter.net/gnutella/flowcntl.htm.
-
-
-
-
22
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Technical report, Secure Networks, Inc., January
-
T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
-
(1998)
-
-
Ptacek, T.1
Newsham, T.2
-
23
-
-
0038628618
-
Query-flood DoS attacks in gnutella networks (extended version)
-
Technical Report, Stanford Univ. CS Dept.
-
N. Daswani and H. Garcia-Molina. Query-flood DoS Attacks in Gnutella Networks (Extended Version). Technical Report, Stanford Univ. CS Dept.
-
-
-
Daswani, N.1
Garcia-Molina, H.2
-
24
-
-
0003242071
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. ACM SIGCOMM, 2001.
-
ACM SIGCOMM, 2001
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
25
-
-
0037614436
-
-
Reputation technologies home page
-
Reputation technologies home page. http://reputation.com.
-
-
-
-
26
-
-
0038628619
-
The free haven project: Design and deployment of an anonymous secure data haven
-
MIT Masters Thesis May
-
R. Dingledine. The free haven project: Design and deployment of an anonymous secure data haven. MIT Masters Thesis May 2000.
-
(2000)
-
-
Dingledine, R.1
-
27
-
-
0037952408
-
Sachrifc: Simple flow control for gnutella
-
Sachrifc: Simple flow control for gnutella. http://www.limewire.com/developer/sachrifc.html.
-
-
-
-
29
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society Press, May
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proc. 1997 IEEE Symposium on Security and Privacy, pages 208-223. IEEE Computer Society Press, May 1997.
-
(1997)
Proc. 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
30
-
-
0037614434
-
Ultrapeers: Another step towards gnutella scalability
-
Ultrapeers: Another step towards gnutella scalability. http://groups.yahoo.com/group/the_gdf/files/Proposals/Ultrapeer/Ultrapeers.h tml.
-
-
-
-
31
-
-
0001887844
-
Hash-based ip traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-based ip traceback. In Proc. of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2001., 2001.
-
(2001)
Proc. of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2001
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
33
-
-
0035361712
-
Network support for ip traceback
-
June
-
A. Karlin, S. Savage, D. Wetherall, and T. Anderson. Network support for ip traceback. In ACM/IEEE Transactions on Networking, 9(3), June 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
-
-
Karlin, A.1
Savage, S.2
Wetherall, D.3
Anderson, T.4
-
34
-
-
0037952388
-
Practical network support for ip traceback
-
A. Karlin, S. Savage, D. Wetherall and T. Anderson. Practical network support for ip traceback. In Proc. 2000 ACM SIGCOMM Conference, Stockholm, Sweden, August 2000.
-
Proc. 2000 ACM SIGCOMM Conference, Stockholm, Sweden, August 2000
-
-
Karlin, A.1
Savage, S.2
Wetherall, D.3
Anderson, T.4
-
35
-
-
0003844740
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
Technical Report TR-819, MIT, March
-
I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. Technical Report TR-819, MIT, March 2001.
-
(2001)
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.4
Balakrishnan, H.5
-
36
-
-
0010294735
-
Designing a super-peer network
-
Submitted for publication
-
B. Yang and H. Garcia-Molina. Designing a super-peer network. Submitted for publication.
-
-
-
Yang, B.1
Garcia-Molina, H.2
-
37
-
-
0038289902
-
Efficient search in peer-to-peer networks
-
Technical report, Stanford Univ., CS Dept.
-
Beverly Yang and Hector Garcia-Molina. Efficient search in peer-to-peer networks. Technical report, Stanford Univ., CS Dept., 2001.
-
(2001)
-
-
Yang, B.1
Garcia-Molina, H.2
-
38
-
-
0023829320
-
A formal specification and verification method for the prevention of denial of service
-
Oakland, CA. IEEE Computer Society Press. 117
-
C. Yu and V. Gligor. A formal specification and verification method for the prevention of denial of service. In Proc. 1988 IEEE Symposium on Security and Privacy, pages 187-202, Oakland, CA. IEEE Computer Society Press. 117, 1988.
-
(1988)
Proc. 1988 IEEE Symposium on Security and Privacy
, pp. 187-202
-
-
Yu, C.1
Gligor, V.2
-
39
-
-
0003858844
-
Tapestry: An infrastructure for fault-resilient wide-area location and routing
-
Technical Report UCB//CSD-01-1141, U. C. Berkeley, April
-
B. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-resilient wide-area location and routing. Technical Report UCB//CSD-01-1141, U. C. Berkeley, April 2001.
-
(2001)
-
-
Zhao, B.1
Kubiatowicz, J.2
Joseph, A.3
|