-
1
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
Apr.
-
L. Garber, "Denial-of-Service Attacks Rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, Apr. 2000.
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
3
-
-
85180777711
-
An algebraic approach to IP traceback
-
Feb.
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," Proc. Network and Distributed System Security Symp., pp. 3-12, Feb. 2001.
-
(2001)
Proc. Network and Distributed System Security Symp.
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
4
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM, pp. 295-306, Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
5
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. Infocom, Apr. 2001.
-
Proc. Infocom, Apr. 2001
-
-
Song, D.1
Perrig, A.2
-
6
-
-
0034448864
-
Using router stamping to identify the source of IP packets
-
Nov.
-
D. Doeppner, P. Klein, and A. Koyfman, "Using Router Stamping to Identify the Source of IP Packets," Proc. ACM Conf. Computer and Comm. Security, pp. 184-189, Nov. 2000.
-
(2000)
Proc. ACM Conf. Computer and Comm. Security
, pp. 184-189
-
-
Doeppner, D.1
Klein, P.2
Koyfman, A.3
-
8
-
-
0004194675
-
Internet draft: ICMP traceback messages
-
technical report, Network Working Group, Mar.
-
S. Bellovin, "Internet Draft: ICMP Traceback Messages," technical report, Network Working Group, Mar. 2000.
-
(2000)
-
-
Bellovin, S.1
-
9
-
-
0003552333
-
Controlling high bandwidth aggregates in the network
-
technical report, ACIRI and AT&T Labs Research, Feb.
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," technical report, ACIRI and AT&T Labs Research, Feb. 2001.
-
(2001)
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
10
-
-
0142067284
-
Internet mapping
-
B. Cheswick, "Internet Mapping," available at http://cm.bell-labs.com/who/ches/map/dbs/index.html, 1999.
-
(1999)
-
-
Cheswick, B.1
-
11
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm, ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Comm, ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
12
-
-
0142098941
-
-
Caida's Skitter Project Web Page
-
Caida's Skitter Project Web Page, http://www.caida.org/Tools/Skitter/, 2003.
-
(2003)
-
-
-
13
-
-
0142098939
-
-
Akamai Technologies Inc.
-
Akamai Technologies Inc., http://www.akamai.com/, 2003.
-
(2003)
-
-
-
14
-
-
0037328484
-
Sustaining availability of web services under severe denial of service attacks
-
Feb.
-
J. Xu and W. Lee, "Sustaining Availability of Web Services under Severe Denial of Service Attacks," IEEE Trans. Computers, vol. 52, no. 2, Feb. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.2
-
-
Xu, J.1
Lee, W.2
-
15
-
-
0004077031
-
Photuris: Session-key management protocol
-
IETF RFC 2522, Mar.
-
P. Karn and W. Simpson, "Photuris: Session-Key Management Protocol," IETF RFC 2522, Mar. 1999.
-
(1999)
-
-
Karn, P.1
Simpson, W.2
-
16
-
-
0003531721
-
An analysis of security incidents on the internet
-
PhD thesis, Carnegie Mellon Univ., Aug.
-
J. Howard, "An Analysis of Security Incidents on the Internet," PhD thesis, Carnegie Mellon Univ., Aug. 1998.
-
(1998)
-
-
Howard, J.1
-
17
-
-
0003659019
-
TCP SYN flooding and IP spoofing attacks
-
CERT; Advisory CA-96.21, Sept.
-
CERT, "TCP SYN Flooding and IP Spoofing Attacks," Advisory CA-96.21, Sept. 1996.
-
(1996)
-
-
-
20
-
-
84904887582
-
TCP SYN flooding attack and the firewall-1 syndefender
-
Checkpoint Inc.
-
Checkpoint Inc., "TCP SYN Flooding Attack and the Firewall-1 Syndefender," http://www.checkpoint.com/products/firewall-1/syndefender.html, 1997.
-
(1997)
-
-
-
21
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
F. Kargl, J. Maier, S. Schlott, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," Proc. World Wide Web Conf., May 2001.
-
Proc. World Wide Web Conf., May 2001
-
-
Kargl, F.1
Maier, J.2
Schlott, S.3
Weber, M.4
-
24
-
-
0003553458
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
RFC 2267, Jan.
-
P. Ferguson, "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," RFC 2267, Jan. 1998.
-
(1998)
-
-
Ferguson, P.1
-
25
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law internets
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DOS Attack Prevention in Power-Law Internets," Proc. ACM Sigcomm, Aug. 2001.
-
Proc. ACM Sigcomm, Aug. 2001
-
-
Park, K.1
Lee, H.2
|