-
1
-
-
25844506602
-
Internet scanning database
-
Internet scanning database, http://cin.bell-labs.cont/whoiches/map/dbs/ index.html, 1999.
-
(1999)
-
-
-
2
-
-
2442446610
-
"Computer Emergency Response Team Cert Advisory ca-2000-01. Denial-Of-Service Developments"
-
"Computer Emergency Response Team, Cert Advisory ca-2000-01. Denial-of-Service Developments," http://www.cert.org/advisories/ ca-2000-01.html, 2000,
-
(2000)
-
-
-
3
-
-
0002738343
-
"Secukity Problems in the TCP/IP Protocol Suite"
-
S. Bellowin, "Secukity Problems in the TCP/IP Protocol Suite," Computer Comm. Rev., pp. 32-48, 1989.
-
(1989)
Computer Comm. Rev.
, pp. 32-48
-
-
Bellowin, S.1
-
4
-
-
85011016678
-
"Tracing Anonymous Packets to their Approximate Source"
-
Dec.
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to their Approximate Source," Usenix LISA, Dec. 2000.
-
(2000)
Usenix LISA
-
-
Burch, H.1
Cheswick, B.2
-
7
-
-
0003553457
-
"RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing"
-
The Internet Society, Jan.
-
P. Ferguson and D. Senie, "RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," The Internet Society, Jan. 1998.
-
(1998)
-
-
Ferguson, P.1
Senie, D.2
-
8
-
-
0003531721
-
"An Analysis of Security Incidents on the Internet"
-
PhD Thesis, Carnegie Mellon Univ., Aug.
-
J. Howard, "An Analysis of Security Incidents on the Internet," PhD Thesis, Carnegie Mellon Univ., Aug. 1998.
-
(1998)
-
-
Howard, J.1
-
9
-
-
25844487708
-
"You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDOS Attackers"
-
Technical Report CS-TR-2002-06, Computer Science Eng. Dept., Chinese Univ. Hong Kong
-
K.T. Law, J.C.S. Lui, and D.K.Y. Yau, "You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDOS Attackers," Technical Report CS-TR-2002-06, Computer Science Eng. Dept., Chinese Univ. Hong Kong, 2002.
-
(2002)
-
-
Law, K.T.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
10
-
-
84950242640
-
"On Design and Evaluation of Intention-Driven ICMP Traceback"
-
A. Mankin, D. Massey, C.-L. Wu, S.F. Wu, and L. Zhang, "On Design and Evaluation of Intention-Driven ICMP Traceback," Proc. IEEE Int'l Conf. Computer Comm. and Networks, 2001.
-
(2001)
Proc. IEEE Int'l Conf. Computer Comm. and Networks
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
14
-
-
0033650584
-
"Practical Network Support for IP Traceback"
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. 2000 ACM SIGCOMM Conf., pp. 295-306, Aug. 2000.
-
(2000)
Proc. 2000 ACM SIGCOMM Conf.
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
15
-
-
0035361712
-
"Network Support for IP Traceback"
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP Traceback," ACM/IEEE Trans. Networking, vol. 9, no. 3, June 2001.
-
(2001)
ACM/IEEE Trans. Networking
, vol.9
, Issue.3
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
16
-
-
0001887844
-
"Hash-Based IP Traceback"
-
Aug.
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, and W.T. Strayer, "Hash-Based IP Traceback," Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm., Aug. 2001.
-
(2001)
Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm.
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
17
-
-
0034997397
-
"Advanced and Authenticated Marking Schemes for IP Traceback"
-
Apr.
-
D.X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM Conf., Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM Conf.
-
-
Song, D.X.1
Perrig, A.2
-
18
-
-
0004194675
-
"ICMP Traceback Messages"
-
draft-bellovin-itrace-00.txt, Mar.
-
E. Steven and M. Bellovin, "ICMP Traceback Messages," draft-bellovin-itrace-00.txt, Mar. 2000.
-
(2000)
-
-
Steven, E.1
Bellovin, M.2
-
19
-
-
85084163540
-
"Centertrack: An IP Overlay Network for Tracking DOS Floods"
-
Aug.
-
R. Stone, "Centertrack: An IP Overlay Network for Tracking DOS Floods," Proc. Ninth LISENIX Security Symp., Aug. 2000.
-
(2000)
Proc. Ninth LISENIX Security Symp.
-
-
Stone, R.1
-
20
-
-
25844524821
-
"Intention-Driven ICMP Trace-Back, Internet Draft"
-
draft-wu-itrace-intention-00.txt, Feb.
-
S.F. Wu, L. Zhang, D. Massey, and A. Mankin, "Intention-Driven ICMP Trace-Back, Internet Draft," draft-wu-itrace-intention-00.txt, Feb. 2001.
-
(2001)
-
-
Wu, S.F.1
Zhang, L.2
Massey, D.3
Mankin, A.4
-
21
-
-
0038404196
-
"Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles"
-
May
-
D.K.Y. Yau, J.C.S. Lui, and F. Liang, "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," Proc. IEEE Int'l Workshop Quality of Service (IWQoS), May 2002.
-
(2002)
Proc. IEEE Int'l Workshop Quality of Service (IWQoS)
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
-
22
-
-
0038404196
-
"Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles"
-
D.K.Y. Yau, J.C.S. Lui, F. Liang, and Y. Yeung, "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," Proc. 10th IEEE Int'l Workshop Quality of Service, 2002.
-
(2002)
Proc. 10th IEEE Int'l Workshop Quality of Service
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yeung, Y.4
|