메뉴 건너뛰기




Volumn 3619, Issue , 2005, Pages 423-432

HAWK: Halting Anomalies with Weighted choKing to rescue well-behaved TCP sessions from shrew DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER SCIENCE; DISTRIBUTED COMPUTER SYSTEMS; PACKET NETWORKS; QUEUEING NETWORKS;

EID: 26444519904     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11534310_46     Document Type: Conference Paper
Times cited : (45)

References (8)
  • 2
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks -the shrew vs. the mice and elephants
    • Aug.
    • A. Kuzmanovic and E. W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks -The Shrew vs. the Mice and Elephants," Proceedings of ACM SIGCOMM 2003, Aug. 2003.
    • (2003) Proceedings of ACM SIGCOMM 2003
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 3
    • 0033905870 scopus 로고    scopus 로고
    • CHOKe: A stateless active queue management scheme for approximating fair bandwidth allocation
    • Apr.
    • R. Pan, B. Prabhakar, and K. Psounis, "CHOKe: A Stateless Active Queue Management Scheme for Approximating Fair Bandwidth Allocation," INFOCOM 2000, vol. 2, pp. 942-951, Apr. 2000.
    • (2000) INFOCOM 2000 , vol.2 , pp. 942-951
    • Pan, R.1    Prabhakar, B.2    Psounis, K.3
  • 4
    • 0038402356 scopus 로고    scopus 로고
    • End-to-end available bandwidth: Measurement methodology, dynamics, and relation with TCP throughput
    • Aug.
    • M. Jain and C. Dovrolis, "End-to-End Available Bandwidth: Measurement Methodology, Dynamics, and Relation with TCP Throughput," Proceedings of ACM SIGCOMM '02, Aug. 2002.
    • (2002) Proceedings of ACM SIGCOMM '02
    • Jain, M.1    Dovrolis, C.2
  • 6
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • Aug.
    • S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, Aug. 1993.
    • (1993) IEEE/ACM Transactions on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 8
    • 4243137229 scopus 로고    scopus 로고
    • Cyber defense technology: Networking and evaluation
    • Mar.
    • DETER and EMIST Projects, "Cyber Defense Technology: Networking and Evaluation," Comm. ACM, pp. 58-61, Mar. 2004. Also from DETER Website: http://www.isi.edu/deter/docs/acmpaper.pdf
    • (2004) Comm. ACM , pp. 58-61


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.