-
1
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden
-
S. Savage, D. Wetherall, A. Karlin and T. Andersen, "Practical network support for IP traceback," Proceedings of ACM SIGCOMM, 2000, Stockholm, Sweden, pp. 295-306.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Andersen, T.4
-
2
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," Proceedings of IEEE INFOCOM, 2001, pp. 878-886.
-
(2001)
Proceedings of IEEE INFOCOM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
4
-
-
0002624024
-
Tracing anonymous packets to their approximate source
-
New Orleans, U.S.A., Dec.
-
Hal Burch and Bill Cheswick, "Tracing anonymous packets to their approximate source," 14th Systems Administration Conference, New Orleans, U.S.A., Dec. 2000, pp. 313-322.
-
(2000)
14th Systems Administration Conference
, pp. 313-322
-
-
Burch, H.1
Cheswick, B.2
-
5
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
August
-
Robert Stone, "CenterTrack: an IP overlay network for tracking DoS floods," 9th USENIX Security Symposium, August 2000.
-
(2000)
9th USENIX Security Symposium
-
-
Stone, R.1
-
6
-
-
8344278876
-
ICMP traceback messages
-
March
-
Steven M. Bellovin, "ICMP Traceback messages," Internet Draft, March 2001.
-
(2001)
Internet Draft
-
-
Bellovin, S.M.1
-
7
-
-
84950242640
-
On design and evaluation of "intention-driven" ICMP traceback
-
Allison Mankin, Dan Massey, Chien-Lung Wu, S. Felix Wu and Lixia Zhang, "On design and evaluation of "intention-driven" ICMP traceback," 10th International Conference on Computer Communications and Networks (ICCCN) 2001, pp. 159-165.
-
(2001)
10th International Conference on Computer Communications and Networks (ICCCN)
, pp. 159-165
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
8
-
-
0034775309
-
Hash-based IP traceback
-
San Diego, California, U.S.A., Aug. 27-31
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent and W. T. Strayer, "Hash-based IP traceback," Proceedings of ACM SIGCOMM, San Diego, California, U.S.A., Aug. 27-31, 2001, pp. 3-14.
-
(2001)
Proceedings of ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
9
-
-
3543126644
-
Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation
-
Berkeley, California, U.S.A
-
J. Li, M. Sung, J. Xu and L. Li, "Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 115-129.
-
(2004)
IEEE Symposium on Security and Privacy (S&P)
, pp. 115-129
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
10
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
D. Senie, "Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing," RFC 2827, 5 2000.
-
(2000)
RFC
, vol.2827
, Issue.5
-
-
Senie, D.1
-
11
-
-
0036349004
-
SAVE: Souve address validity enforcement protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher and Lixia Zhang, "SAVE: souve address validity enforcement protocol," Proceedings of IEEEINFOCOM, 2002, pp.1557-1566.
-
(2002)
Proceedings of IEEEINFOCOM
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
13
-
-
35048820228
-
Mayday: Distributed filtering for Internet services
-
D. Andersen, "Mayday: distributed filtering for Internet services," Proceedings of USITS, 2003.
-
(2003)
Proceedings of USITS
-
-
Andersen, D.1
-
14
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
Berkeley, California, U.S.A.
-
A. Yaar, A. Perrig and D. Song, "Pi: a path identification mechanism to defend against DDoS attacks," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, U.S.A., pp. 93-107.
-
(2003)
IEEE Symposium on Security and Privacy (S&P)
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
15
-
-
3543059601
-
StackPi: A new defensive mechnamism against IP spoofing and DDoS attacks
-
Carnegie Mellon University, February
-
A. Perrig, D. Song and A. Yaar, "StackPi: a new defensive mechnamism against IP spoofing and DDoS attacks," Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
-
(2003)
Technical Report
, vol.CMU-CS-02-208
-
-
Perrig, A.1
Song, D.2
Yaar, A.3
-
16
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
October 27-31, 2003, Washington, DC, USA
-
C. Jin, H. Wang and K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic," 10th ACM Conference on Computer and Communications Security (CCS) 2003, October 27-31, 2003, Washington, DC, USA, pp.30-41.
-
(2003)
10th ACM Conference on Computer and Communications Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
17
-
-
8344261545
-
PacketScore: Statistics-based overload control against distributed denialof-service attacks
-
Y. Kim, W. Ch. Lau, M. C. Chuah, H. J. Chao. "PacketScore: Statistics-based overload control against distributed denialof-service attacks", Proceedings of IEEE INFOCOM 2004.
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Kim, Y.1
Lau, W.Ch.2
Chuah, M.C.3
Chao, H.J.4
-
18
-
-
3543097593
-
SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
-
Berkeley, California, U.S.A
-
A. Yaar, A. Perrig and D. Song, "SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks." IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 130-143.
-
(2004)
IEEE Symposium on Security and Privacy (S&P)
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
19
-
-
3543057677
-
An empirical analysis of target-resident DoS filters
-
Berkeley, California, U.S.A
-
M. Collins and M. K. Reiter, "An empirical analysis of target-resident DoS filters," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 103-114.
-
(2004)
IEEE Symposium on Security and Privacy (S&P)
, pp. 103-114
-
-
Collins, M.1
Reiter, M.K.2
-
21
-
-
0038825046
-
Defending against denialof-service attacks with puzzle auctions
-
Berkeley, California, U.S.A.
-
X. F. Wang and M. K. Reiter, "Defending against denialof-service attacks with puzzle auctions," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, U.S.A., pp. 78-92.
-
(2003)
IEEE Symposium on Security and Privacy (S&P)
, pp. 78-92
-
-
Wang, X.F.1
Reiter, M.K.2
-
22
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Washington DC, U.S.A.
-
B. Waters, A. Juels, J. A. Halderman and E. W. Felten, "New client puzzle outsourcing techniques for DoS resistance," 11th ACM Conference on Computer and Communications Security (CCS) 2004, Washington DC, U.S.A., pp. 246-256.
-
(2004)
11th ACM Conference on Computer and Communications Security (CCS)
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
25
-
-
33744901134
-
Internet indirection infrastructure
-
Aug.
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker and S. Surana, "Internet indirection infrastructure," Proceedings of ACM SIGCOMM, Aug. 2002, pp. 73-86.
-
(2002)
Proceedings of ACM SIGCOMM
, pp. 73-86
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
28
-
-
85045893940
-
Moderately hard, momery-bound functions
-
M. Abadi, M. Burrow, M. Manasse and T. Wobber, "Moderately hard, momery-bound functions," Networks and Distributed System Security Symposium (NDSS), 2003.
-
(2003)
Networks and Distributed System Security Symposium (NDSS)
-
-
Abadi, M.1
Burrow, M.2
Manasse, M.3
Wobber, T.4
-
30
-
-
0019634370
-
Password authentication with insecure communication
-
Nov.
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM 24(11), Nov. 1981, pp. 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
33
-
-
3543121457
-
Preventing Internet denial-of-service with capabilites
-
ACM Press
-
T. Anderson, T. Roscoe and D. Wetherall, "Preventing Internet denial-of-service with capabilites," HotNets-II. ACM Press, 2003.
-
(2003)
HotNets-II
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
|