-
1
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct.
-
R. K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Commun. Mag., Oct. 2002, pp. 42-51.
-
(2002)
IEEE Commun. Mag.
, pp. 42-51
-
-
Chang, R.K.C.1
-
2
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
J. Li et al., "SAVE: Source Address Validity Enforcement Protocol," Proc. INFOCOM, 2002, vol. 3, pp. 1557-66.
-
(2002)
Proc. INFOCOM
, vol.3
, pp. 1557-1566
-
-
Li, J.1
-
4
-
-
0035361712
-
Network support for IP traceback
-
June
-
S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226-37.
-
(2001)
IEEE/ACM Trans. Net.
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
-
5
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. INFOCOM, 2001, vol. 2, pp. 878-86.
-
(2001)
Proc. INFOCOM
, vol.2
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
6
-
-
0004194675
-
-
IETF draft
-
S. M. Bellovin, "ICMP Traceback Messages," IETF draft, 2000; http://www.research.att.com/smb/papers/draft-bellovin-itrace-00.txt.
-
(2000)
ICMP Traceback Messages
-
-
Bellovin, S.M.1
-
7
-
-
84950242640
-
On design and evaluation of 'intention-driven' ICMP traceback
-
S. F. Wu et al., "On Design and Evaluation of 'Intention-Driven' ICMP Traceback," Proc. 10th Int'l. Conf. Comp. Commun. and Nets., 2001, pp. 159-65.
-
(2001)
Proc. 10th Int'l. Conf. Comp. Commun. and Nets.
, pp. 159-165
-
-
Wu, S.F.1
-
8
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
R. Stone, "Centertrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th USENIX Sec. Symp., 2000, pp. 199-212.
-
(2000)
Proc. 9th USENIX Sec. Symp.
, pp. 199-212
-
-
Stone, R.1
-
9
-
-
0036947597
-
Single-packet IP traceback
-
Dec.
-
A. C. Snoeren et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721-34.
-
(2002)
IEEE/ACM Trans. Net.
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
-
10
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. USENIX LISA, 2000, pp. 319-27.
-
(2000)
Proc. USENIX LISA
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
12
-
-
0036564696
-
Challenges to automated attack traceback
-
May-June
-
S. C. Lee and C. Shields, "Challenges to Automated Attack Traceback," IT Professional, vol. 4, no. 3, May-June 2002, pp. 12-18.
-
(2002)
IT Professional
, vol.4
, Issue.3
, pp. 12-18
-
-
Lee, S.C.1
Shields, C.2
|