-
1
-
-
0004194675
-
-
Internet Draft, IETF, March; draft-bellovin-itrace-05.txt (work in progress)
-
S. Bellovin. The icmp traceback message. Internet Draft, IETF, March 2000. draft-bellovin-itrace-05.txt (work in progress). http://www.research.att.com/~smb.
-
(2000)
The Icmp Traceback Message
-
-
Bellovin, S.1
-
3
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
Hal Burch and Bill Cheswick. Tracing anonymous packets to their approximate source. in Proceedings of the 14th Systems Administration Conference, New Orleans, Louisiana, U.S.A., December 2000.
-
Proceedings of the 14th Systems Administration Conference, New Orleans, Louisiana, U.S.A., December 2000
-
-
Burch, H.1
Cheswick, B.2
-
4
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using mib traffic variables- a feasibility study
-
João B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, B. Ravichandran, and Raman K. Mehra. Proactive detection of distributed denial of service attacks using mib traffic variables- a feasibility study. In Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, May 14-18 2001.
-
Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, May 14-18 2001
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.K.5
Ravichandran, B.6
Mehra, R.K.7
-
6
-
-
4243817525
-
Auckland university data traces
-
Waikato Applied Network Dynamics Research Group
-
Waikato Applied Network Dynamics Research Group. Auckland university data traces. http://wand.cs.waikato.ac.nz/wand/wits/.
-
-
-
-
8
-
-
0141773064
-
Pushback: Router-based defense against ddos attacks
-
AT&T Labs Research, February
-
John Ionnidis and Steven M. Bellovin. Pushback: Router-based defense against ddos attacks. AT&T Labs Research, February 2001.
-
(2001)
-
-
Ionnidis, J.1
Bellovin, S.M.2
-
11
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
12
-
-
0003552333
-
Controlling high bandwidth aggregates in the network
-
Technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, February
-
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ionnidis, Vern Paxson, and Scott Shenker. Controlling high bandwidth aggregates in the network. Technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, February 2001.
-
(2001)
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ionnidis, J.4
Paxson, V.5
Shenker, S.6
-
13
-
-
14644406412
-
Countering syn flood denial-of-service attacks
-
August 29
-
Ross Oliver. Countering syn flood denial-of-service attacks, August 29 2001. http://www.usenix.org/events/sec01/invitedtalks/oliver.pdf.
-
(2001)
-
-
Oliver, R.1
-
14
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack
-
K. Park and H. Lee. On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack. In Proceedings of IEEE IFOCOM 2001, 2001.
-
Proceedings of IEEE IFOCOM 2001, 2001
-
-
Park, K.1
Lee, H.2
-
15
-
-
0141549761
-
On the effectiveness of router-based packet filtering for distributed dos attack prevention in power-law internets
-
Kihong Park and Heejo Lee. On the effectiveness of router-based packet filtering for distributed dos attack prevention in power-law internets. In Proceedings of the 2001 ACM SIGCOMM Conference, San Diego, California, U.S.A., August 2001.
-
Proceedings of the 2001 ACM SIGCOMM Conference, San Diego, California, U.S.A., August 2001
-
-
Park, K.1
Lee, H.2
-
16
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
Vern Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR), 31(3), July 2001.
-
(2001)
ACM Computer Communications Review (CCR)
, vol.31
, Issue.3
-
-
Paxson, V.1
-
17
-
-
0141549760
-
Adjusted probabilistic packet marking for ip traceback
-
Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao. Adjusted probabilistic packet marking for ip traceback. In Proceedings of Networking 2002, Pisa, Italy, May 2002.
-
Proceedings of Networking 2002, Pisa, Italy, May 2002
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
19
-
-
0038223869
-
Hash-based ip traceback
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer. Hash-based ip traceback. In Proceedings of the 2001 ACM SIGCOMM Conference, San Diego, California, U.S.A., August 2001.
-
Proceedings of the 2001 ACM SIGCOMM Conference, San Diego, California, U.S.A., August 2001
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
20
-
-
0034997397
-
Advanced and authenticated marking schemes for ip traceback
-
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for ip traceback. In Proceedings of IEEE INFOCOM 2001, 2001. http://paris.cs.berkeley.edu/perrig/projects/iptraceback/tr-iptrace.ps.gz.
-
Proceedings of IEEE INFOCOM 2001, 2001
-
-
Song, D.X.1
Perrig, A.2
-
22
-
-
0038417435
-
A defense against address spoofing using active networks
-
MIT Master Thesis
-
Van Van. A defense against address spoofing using active networks, 1997. MIT Master Thesis.
-
(1997)
-
-
Van, V.1
-
23
-
-
0141661117
-
-
Internet Draft,IETF, February; draft-wu-itrace-intension-00.txt(work in progress)
-
S. Felix Wu, Lixia Zhang, Dan Massey, and Allison Mankin Intension-Driven ICMP Trace-Back. Internet Draft,IETF, February 2001. draft-wu-itrace-intension-00.txt(work in progress).
-
(2001)
Intension-Driven ICMP Trace-Back
-
-
Felix Wu, S.1
Zhang, L.2
Massey, D.3
Mankin, A.4
|