-
1
-
-
84862368630
-
-
Akamai Corporation, http://www.akamai.com.
-
-
-
-
3
-
-
84862364555
-
-
NetSec Group. http://www.cs.pitt.edu/NETSEC.
-
-
-
-
4
-
-
84862364554
-
-
Snort, http://www.snort.com.
-
-
-
-
6
-
-
4143130116
-
-
CERT. Denial of Service Attacks. http://www.cert.org/tech_tips/ denial_of_service.html, 1997.
-
(1997)
Denial of Service Attacks
-
-
-
9
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
May
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. In RFC 2827, May 2001.
-
(2001)
RFC 2827
-
-
Ferguson, P.1
Senie, D.2
-
11
-
-
2442631684
-
Distributed denial of service attacks: Defenses, a special publication
-
Global Integrity
-
J. Jones. Distributed Denial of Service Attacks: Defenses, A Special Publication. Technical report, Global Integrity, 2000.
-
(2000)
Technical Report
-
-
Jones, J.1
-
12
-
-
0002459783
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In Proceedings of NDSS'99.
-
Proceedings of NDSS'99
-
-
Juels, A.1
Brainard, J.2
-
15
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks. (The shrew vs. The mice and elephants)
-
A. Kuzmanovic and E. W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks. (The Shrew vs. the Mice and Elephants). In ACM SIGCOMM 2003.
-
ACM SIGCOMM 2003
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
17
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
ACM Press
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis,. V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. In ACM SIGCOMM Computer Communication Review, volume 32, pages 62-73. ACM Press, 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
18
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Computer Science Department, University of California, Los Angeles
-
J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report 020018, Computer Science Department, University of California, Los Angeles, 2002.
-
(2002)
Technical Report 020018
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
20
-
-
0003804730
-
A weakness in the 4.2BSD unix TCP/IP software
-
AT&T Bell Labs Computer Science
-
R. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report 117, AT&T Bell Labs Computer Science, 1985.
-
(1985)
Technical Report
, vol.117
-
-
Morris, R.1
-
21
-
-
0141760371
-
Defending against distributed denial of service attack using selective pushback
-
T. Peng, C. Leckie, and K. Ramamohanarao. Defending against distributed denial of service attack using selective pushback. In Proceedings of ICT 2002.
-
Proceedings of ICT 2002
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
22
-
-
0012109964
-
-
Addison-Wisley, Indianapolis, IN
-
T. H. Project. Know Your Enemy. Addison-Wisley, Indianapolis, IN, 2002.
-
(2002)
Know Your Enemy
-
-
Project, T.H.1
-
23
-
-
0003195066
-
The MD5 message-digest algorithm
-
R. Rivest. The MD5 message-digest algorithm. In RFC 1321, 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
24
-
-
84979076059
-
PayWord and MicroMint-two simple micropayment schemes
-
M. Lomas, editor, number 1189 in Lecture Notes in Computer Science. Springer
-
R. L. Rivest and A. Shamir. PayWord and MicroMint-Two Simple Micropayment Schemes. In M. Lomas, editor, Proceedings of 1996 International Workshop on Security Protocols, number 1189 in Lecture Notes in Computer Science, pages 69-87. Springer, 1996.
-
(1996)
Proceedings of 1996 International Workshop on Security Protocols
, pp. 69-87
-
-
Rivest, R.L.1
Shamir, A.2
-
33
-
-
84903755100
-
Honeypots for distributed denial-of-service attacks
-
N. Weiler. Honeypots for distributed denial-of-service attacks. In Proceedings of WET ICE 2002.
-
Proceedings of WET ICE 2002
-
-
Weiler, N.1
-
36
-
-
70349522709
-
The XenoService - A distributed defeat for distributed denial of service
-
J. Yan, S. Early, and R. Anderson. The XenoService - A Distributed Defeat for Distributed Denial of Service. In Proceedings of ISW 2000.
-
Proceedings of ISW 2000
-
-
Yan, J.1
Early, S.2
Anderson, R.3
-
37
-
-
0003515999
-
COCA: A secure distributed on-line certification authority
-
Department of Computer Science, Cornell University, Ithaca, NY USA
-
L. Zhou, F. Schneider, and R. van Renesse. COCA: A Secure Distributed On-line Certification Authority. Technical report, Department of Computer Science, Cornell University, Ithaca, NY USA, 2000.
-
(2000)
Technical Report
-
-
Zhou, L.1
Schneider, F.2
Van Renesse, R.3
|