-
2
-
-
0003659019
-
-
CERT Advisory CA-96.21. Online. Available:
-
TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CA-96.21. Online. Available: http://www.cert.org/
-
TCP SYN Flooding and IP Spoofing Attacks
-
-
-
3
-
-
0013240874
-
-
CERT Advisory CA-1998-01. [Online]. Available: www.cert.org/advisories /CA-98.01.html
-
(1998) Smurf IP Denial-of-Service Attacks. CERT Advisory CA-1998-01. [Online]. Available: www.cert.org/advisories/CA-98.01.html
-
(1998)
Smurf IP Denial-of-Service Attacks
-
-
-
4
-
-
0031701137
-
"Converging to approximated max-min flow fairness in logarithmic time"
-
San Francisco, CA, Mar
-
B. Awerbuch and Y. Shavitt, "Converging to approximated max-min flow fairness in logarithmic time," in Proc. IEEE INFOCOM, San Francisco, CA, Mar. 1998.
-
(1998)
Proc. IEEE INFOCOM
-
-
Awerbuch, B.1
Shavitt, Y.2
-
5
-
-
0033294349
-
"Inter-AS traffic patterns and their implications"
-
Rio de Janeiro, Brazil, Dec
-
W. Fang and L. Peterson, "Inter-AS traffic patterns and their implications," in Proc. IEEE Global Internet Symp., Rio de Janeiro, Brazil, Dec. 1999.
-
(1999)
Proc. IEEE Global Internet Symp.
-
-
Fang, W.1
Peterson, L.2
-
6
-
-
0003553457
-
"Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing"
-
IETF, RFC 2827
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," IETF, RFC 2827, 2000.
-
(2000)
-
-
Ferguson, P.1
Senie, D.2
-
7
-
-
84948391665
-
"Mitigation of DoS attacks through QoS regulation"
-
Miami Beach, FL, May
-
A. Garg and A. L. N. Reddy, "Mitigation of DoS attacks through QoS regulation," in Proc. IEEE IWQoS, Miami Beach, FL, May 2002.
-
(2002)
Proc. IEEE IWQoS
-
-
Garg, A.1
Reddy, A.L.N.2
-
8
-
-
0034514644
-
"Hop integrity in computer networks"
-
Osaka, Japan, Nov
-
M. G. Gouda, E. N. Elnozahy, C. T. Huang, and T. M. McGuire, "Hop integrity in computer networks," in Proc. IEEE ICNP, Osaka, Japan, Nov. 2000.
-
(2000)
Proc. IEEE ICNP
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.T.3
McGuire, T.M.4
-
9
-
-
15544390434
-
"Quality of Service Provisioning for Composable Routing Elements"
-
Purdue Univ., West Lafayette, IN, Tech. Rep
-
S. C. Han, P. Zaroo, D. K. Y. Yau, P. Gopalan, and J. C. S. Lui, "Quality of Service Provisioning for Composable Routing Elements," Purdue Univ., West Lafayette, IN, Tech. Rep., 2002.
-
(2002)
-
-
Han, S.C.1
Zaroo, P.2
Yau, D.K.Y.3
Gopalan, P.4
Lui, J.C.S.5
-
10
-
-
0003470642
-
"Security Architecture for the Internet Protocol"
-
IETF, RFC 2401
-
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," IETF, RFC 2401, 1998.
-
(1998)
-
-
Kent, S.1
Atkinson, R.2
-
11
-
-
15544385282
-
"On Defending Against Distributed Denial-of-Service Attacks With Server-Centric Router Throttles"
-
Dept of Computer Sciences, Purdue University, West Lafayette, IN, Tech. Rep. TR-01-008
-
F. Liang, D. K. Y. Yau, and J. C. S. Lui, "On Defending Against Distributed Denial-of-Service Attacks With Server-Centric Router Throttles," Dept of Computer Sciences, Purdue University, West Lafayette, IN, Tech. Rep. TR-01-008, 2001.
-
(2001)
-
-
Liang, F.1
Yau, D.K.Y.2
Lui, J.C.S.3
-
12
-
-
0003241928
-
"Internet security attacks at the basic levels"
-
Apr
-
G. de Vivo, M. de Vivo, and G. Isern, "Internet security attacks at the basic levels," ACM Oper. Syst. Rev., vol. 32, Apr. 1998.
-
(1998)
ACM Oper. Syst. Rev.
, vol.32
-
-
de Vivo, G.1
de Vivo, M.2
Isern, G.3
-
13
-
-
0003552333
-
"Controlling High Bandwidth Aggregates in the Network"
-
CIRI and AT&T Labs Research, Tech. Rep
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," ACIRI and AT&T Labs Research, Tech. Rep., 2001.
-
(2001)
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
14
-
-
0027612043
-
"A generalized processor sharing approach to flow control in integrated services networks: The single-node case"
-
Jun
-
A. K. Parekh and R. G. Gallager, "A generalized processor sharing approach to flow control in integrated services networks: The single-node case," IEEE/ACM Trans. Networking, vol. 1, pp. 344-357, Jun. 1993.
-
(1993)
IEEE/ACM Trans. Networking
, vol.1
, pp. 344-357
-
-
Parekh, A.K.1
Gallager, R.G.2
-
15
-
-
0035010963
-
"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack"
-
Anchorage, AK
-
K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," in Proc. IEEE INFOCOM, Anchorage, AK, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Park, K.1
Lee, H.2
-
16
-
-
0001647024
-
"Practical network support for IP traceback"
-
Stockholm, Sweden, Aug
-
S. Savage, D Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Stockholm, Sweden, Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
17
-
-
0034997397
-
"Advanced and authenticated techniques for IP traceback"
-
Anchorage, AK
-
D. Song and A. Perrig, "Advanced and authenticated techniques for IP traceback," in Proc. IEEE INFOCOM, Anchorage, AK, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Song, D.1
Perrig, A.2
-
18
-
-
0036343692
-
"Detecting SYN flooding attacks"
-
New York, NY, Jun
-
H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, New York, NY, Jun. 2002.
-
(2002)
Proc. IEEE INFOCOM
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
19
-
-
0035270344
-
"Resource management in software-programmable router operating systems"
-
Mar
-
D. K. Y. Yau and X. Chen, "Resource management in software-programmable router operating systems," IEEE J. Select. Areas Commun., vol. 19, no. 3, pp. 488-500, Mar. 2001.
-
(2001)
IEEE J. Select. Areas Commun.
, vol.19
, Issue.3
, pp. 488-500
-
-
Yau, D.K.Y.1
Chen, X.2
|