-
4
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
May
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," RFC 2827, May 2000.
-
(2000)
RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
5
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," ACM Computer Comm. Rev., vol. 32, no. 3, July 2002.
-
(2002)
ACM Computer Comm. Rev.
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Paxson, V.4
Shenker, S.5
-
6
-
-
85013623251
-
Congestion avoidance and control
-
Aug.
-
V. Jacobson, "Congestion Avoidance and Control," ACM Computer Comm. Rev.; Proc. Sigcomm '88 Symp., vol. 18, no. 4, pp. 314-329, Aug. 1988.
-
(1988)
ACM Computer Comm. Rev.; Proc. Sigcomm '88 Symp.
, vol.18
, Issue.4
, pp. 314-329
-
-
Jacobson, V.1
-
7
-
-
0003355302
-
User datagram protocol
-
Aug.
-
J. Postel, "User Datagram Protocol," RFC 768, Aug. 1980.
-
(1980)
RFC
, vol.768
-
-
Postel, J.1
-
8
-
-
84861259078
-
-
Segregated by Application, CAIDA
-
Characterization of Internet Traffic Loads, Segregated by Application, CAIDA, http://www.caida.org/analysis/workload/byapplication/, 2002.
-
(2002)
Characterization of Internet Traffic Loads
-
-
-
9
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
May
-
C. Schuba, I. Krsul, M. Kuhn, G. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a Denial of Service Attack on TCP," Proc. 1997 IEEE Symp. Security and Privacy, May 1997.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, G.4
Sundaram, A.5
Zamboni, D.6
-
10
-
-
2542419686
-
Transmission control protocol
-
Sept.
-
I.S. Institute, "Transmission Control Protocol," RFC 793, Sept. 1981
-
(1981)
RFC
, vol.793
-
-
-
11
-
-
0038650772
-
Defending against sequence number attacks
-
May
-
S. Bellovin, "Defending against Sequence Number Attacks," RFC 1948, May 1996.
-
(1996)
RFC
, vol.1948
-
-
Bellovin, S.1
-
13
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Dec.
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar, "An Integrated Experimental Environment for Distributed Systems and Networks," Proc. Fifth Symp. Operating Systems Design and Implementation, pp. 255-270, Dec. 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
14
-
-
84861255563
-
-
Sourceforge, "tcpreplay Tool," http://tcpreplay.sourceforge. net/, 2000.
-
(2000)
Tcpreplay Tool
-
-
-
16
-
-
84861264084
-
-
DETER/EMIST project Web page, http://www.isi.edu/deter, 2004.
-
(2004)
-
-
-
17
-
-
84861255182
-
-
Cisco
-
NetRanger Overview, Cisco, http://www.cisco.com/univercd/ cc/td/doc/product/iaabu/csids/csids1/csidsug/overview.htm, 2004.
-
(2004)
NetRanger Overview
-
-
-
18
-
-
84861259174
-
-
Computer Incident Advisory Capability
-
Network Intrusion Detector Overview, Computer Incident Advisory Capability, http://ciac.llnl.gov/cstc/nid/intro.html, 2004.
-
(2004)
Network Intrusion Detector Overview
-
-
-
19
-
-
84861262159
-
-
Internet Security Systems
-
Intrusion Detection Security Products, Internet Security Systems, http://www.iss.net/securing_e-business/security_products/ intrusion_detection/ index.php, 2005.
-
(2005)
Intrusion Detection Security Products
-
-
-
22
-
-
27644564068
-
On prevention of the denial of service attacks: A control theoretical approach
-
June
-
S. Liu, Y. Xiong, and P. Sun, "On Prevention of the Denial of Service Attacks: A Control Theoretical Approach," Proc. IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, June 2000.
-
(2000)
Proc. IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
-
-
Liu, S.1
Xiong, Y.2
Sun, P.3
-
23
-
-
27644509865
-
NetBouncer: Client-legitimacy-based high-performance DDoS filtering
-
R. Thomas, T. Johnson, J. Croall, and B. Mark, "NetBouncer: Client-legitimacy-based High-performance DDoS Filtering," McA-fee Security J., vol. 6, no. 1, 2004.
-
(2004)
McA-fee Security J.
, vol.6
, Issue.1
-
-
Thomas, R.1
Johnson, T.2
Croall, J.3
Mark, B.4
-
24
-
-
84861257363
-
-
Mazu Networks
-
Mazu Technical White Papers, Mazu Networks, http://www. mazunetworks.com/solutions/white_papers/, 2005.
-
(2005)
Mazu Technical White Papers
-
-
-
25
-
-
84861269970
-
-
The Peakflow Platform, Arbor Networks, http://www. arbornetworks.com, 1999.
-
(1999)
-
-
-
29
-
-
84948391665
-
Mitigation of DoS attacks through QoS regulation
-
May
-
A. Garg and A.L. N. Reddy, "Mitigation of DoS Attacks through QoS Regulation," Proc. IWQOS Workshop, May 2002.
-
(2002)
Proc. IWQOS Workshop
-
-
Garg, A.1
Reddy, A.L.N.2
-
30
-
-
0034497721
-
Distributed denial of service attacks
-
Oct.
-
F. Lau, S.H. Rubin, M.H. Smith, and L. Trajkovic, "Distributed Denial of Service Attacks," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, pp. 2275-2280, Oct. 2000.
-
(2000)
Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics
, pp. 2275-2280
-
-
Lau, F.1
Rubin, S.H.2
Smith, M.H.3
Trajkovic, L.4
-
33
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "Cossack: Coordinated Suppression of Simultaneous Attacks," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX) III, 2003.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX) III
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
34
-
-
17644412520
-
Programming routers to improve network security
-
Sept.
-
R. Canonico, D. Cotroneo, L. Peluso, S.P. Romano, and G. Ventre, "Programming Routers to Improve Network Security," Proc. OPENSIG 2001 Workshop Next Generation Network Programming, Sept. 2001.
-
(2001)
Proc. OPENSIG 2001 Workshop next Generation Network Programming
-
-
Canonico, R.1
Cotroneo, D.2
Peluso, L.3
Romano, S.P.4
Ventre, G.5
-
35
-
-
0011144636
-
Infrastructure for intrusion detection and response
-
D. Schnackenberg, K. Djahandari, and D. Sterne, "Infrastructure for Intrusion Detection and Response," Advanced Security Research J., vol. 3, no. 1, 2001.
-
(2001)
Advanced Security Research J.
, vol.3
, Issue.1
-
-
Schnackenberg, D.1
Djahandari, K.2
Sterne, D.3
-
36
-
-
84861261597
-
-
Cs3. Inc.
-
MANAnet DDoS White Papers, Cs3. Inc, http://www. cs3-inc.com/mananet. html, 2002.
-
(2002)
MANAnet DDoS White Papers
-
-
|