-
1
-
-
84976845043
-
End-to-end arguments in system design
-
Nov.
-
J. Saltzer, D. Reed, and D. Clark, "End-to-End Arguments in System Design," ACM Trans. Computer System, vol. 2, no. 4, pp. 277-288, Nov. 1984.
-
(1984)
ACM Trans. Computer System
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
3
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Computer Science Dept., Univ. of California, Los Angeles
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report CSD-TR-020018, Computer Science Dept., Univ. of California, Los Angeles, 2001.
-
(2001)
Technical Report
, vol.CSD-TR-020018
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
5
-
-
0006797495
-
The changing nature of network traffic: Scaling phenomena
-
Apr.
-
A. Feldmann, A.C. Gilbert, W. Willinger, and T.G. Kurtz, "The Changing Nature of Network Traffic: Scaling Phenomena," ACM SIGCOMM Computer Comm. Rev., vol. 28, no. 2, pp. 5-29, Apr. 1998.
-
(1998)
ACM SIGCOMM Computer Comm. Rev.
, vol.28
, Issue.2
, pp. 5-29
-
-
Feldmann, A.1
Gilbert, A.C.2
Willinger, W.3
Kurtz, T.G.4
-
7
-
-
18144416990
-
A cross-correlation based method for spatial-temporal traffic analysis
-
J. Yuan and K. Mills, "A Cross-Correlation Based Method for Spatial-Temporal Traffic Analysis," J. Performance Evaluation, vol. 61, nos. 2-3, pp. 163-180, 2005.
-
(2005)
J. Performance Evaluation
, vol.61
, Issue.2-3
, pp. 163-180
-
-
Yuan, J.1
Mills, K.2
-
8
-
-
35048886560
-
Detecting Distributed Denial of Service (DDoS) attacks through inductive learning
-
S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning," Lecture Notes in Computer Science, vol. 2690, pp. 286-295, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
9
-
-
4544373082
-
Detecting low-profile probes and novel denial of service attacks
-
R. Basu, K.R. Cunningham, S.E. Webster, and P.R. Lippmann, "Detecting Low-Profile Probes and Novel Denial of Service Attacks," Proc. 2007 IEEE Workshop Information Assurance, 2001.
-
(2001)
Proc. 2001 IEEE Workshop Information Assurance
-
-
Basu, R.1
Cunningham, K.R.2
Webster, S.E.3
Lippmann, P.R.4
-
10
-
-
0942298614
-
Decision analysis of statistically detecting distributed DoS flooding attacks
-
M. Li and C. Chi, Decision Analysis of Statistically Detecting Distributed DoS Flooding Attacks," Int'l J. Information Technology and Decision Making, vol. 2, no. 3, pp. 397-405, 2003.
-
(2003)
Int'l J. Information Technology and Decision Making
, vol.2
, Issue.3
, pp. 397-405
-
-
Li, M.1
Chi, C.2
-
12
-
-
84950296089
-
Countering denial of service attacks using congestion triggered packet sampling and filtering
-
Y. Huang and J.M. Pullen, "Countering Denial of Service Attacks Using Congestion Triggered Packet Sampling and Filtering," Proc. 10th Int'l Conf. Computer Comm. and Networks, 2001.
-
(2001)
Proc. 10th Int'l Conf. Computer Comm. and Networks
-
-
Huang, Y.1
Pullen, J.M.2
-
13
-
-
0035402092
-
On the defense of the distributed denial of service attacks: An on-off feedback control approach
-
Y. Xiong, S. Liu, and P. Sun, "On the Defense of the Distributed Denial of Service Attacks: An On-Off Feedback Control Approach," IEEE Trans. Systems, Man, and Cybernetics - PART A: Systems and Humans, vol. 31, no. 4, pp. 282-293, 2001.
-
(2001)
IEEE Trans. Systems, Man, and Cybernetics - PART A: Systems and Humans
, vol.31
, Issue.4
, pp. 282-293
-
-
Xiong, Y.1
Liu, S.2
Sun, P.3
-
14
-
-
84904888755
-
Attacking DDoS at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," Proc. Int'l Conf. Network Protocols 2002, pp. 312-321, 2002.
-
(2002)
Proc. Int'l Conf. Network Protocols 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
15
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Aug.
-
T.M. Gil and M. Poleto, "MULTOPS: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., pp. 23-38, Aug. 2001.
-
(2001)
Proc. 10th Usenix Security Symp.
, pp. 23-38
-
-
Gil, T.M.1
Poleto, M.2
-
16
-
-
33845536096
-
Detecting traffic anomalies through aggregate analysis of packet header data
-
May
-
S.S. Kim, A.L. N. Reddy, and M. Vannucci, "Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data," Proc. Networking 2004, pp. 1047-1059, May 2004.
-
(2004)
Proc. Networking 2004
, pp. 1047-1059
-
-
Kim, S.S.1
Reddy, A.L.N.2
Vannucci, M.3
-
17
-
-
30344478008
-
ISPs take on DDoS attacks
-
Nov.
-
D. Pappalardo, "ISPs Take on DDoS Attacks," Computerworld, Nov. 2003.
-
(2003)
Computerworld
-
-
Pappalardo, D.1
-
18
-
-
10644248262
-
Characterization of defense mechanisms against distributed denial of service attacks
-
L.-C. Chen, T.A. Longstaff, and K.M. Carley, "Characterization of Defense Mechanisms against Distributed Denial of Service Attacks," Computers and Security, vol. 23, no. 8, pp. 665-678, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.8
, pp. 665-678
-
-
Chen, L.-C.1
Longstaff, T.A.2
Carley, K.M.3
-
20
-
-
46749115908
-
Detecting DDoS attacks on ISP networks
-
A. Akella, A. Bharambe, M. Reiter, and S. Seshan, "Detecting DDoS Attacks on ISP Networks," Proc. ACM SIGMOD/PODS Workshop Management and Processing of Data Streams (MPDS) FCRC 2003, 2003.
-
(2003)
Proc. ACM SIGMOD/PODS Workshop Management and Processing of Data Streams (MPDS) FCRC 2003
-
-
Akella, A.1
Bharambe, A.2
Reiter, M.3
Seshan, S.4
-
22
-
-
85084162258
-
How to own the internet in your spare time
-
Aug.
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," Proc. USENIX Security Symp., pp. 149-167, Aug. 2002.
-
(2002)
Proc. USENIX Security Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
23
-
-
0036804084
-
Defending against flooding-based distributed denial of service attacks: A tutorial
-
R.K. C. Chang, "Defending against Flooding-Based Distributed Denial of Service Attacks: A Tutorial," IEEE Comm. Magazine, vol. 40, no. 10, pp. 42-51, 2002.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
25
-
-
33745967097
-
Macroscopic dynamics of large-scale data networks
-
J. Yuan and K. Mills, "Macroscopic Dynamics of Large-Scale Data Networks," Complex Dynamics in Comm. Networks, pp. 191-212, 2005.
-
(2005)
Complex Dynamics in Comm. Networks
, pp. 191-212
-
-
Yuan, J.1
Mills, K.2
-
26
-
-
0036508428
-
Exploring collective dynamics in communication networks
-
J. Yuan and K. Mills, "Exploring Collective Dynamics in Communication Networks," J. Research of the Nat'l Inst. of Standards and Technology, vol. 107, no. 2, pp. 179-191, 2002.
-
(2002)
J. Research of the Nat'l Inst. of Standards and Technology
, vol.107
, Issue.2
, pp. 179-191
-
-
Yuan, J.1
Mills, K.2
-
27
-
-
85013350011
-
Wide-area traffic: The failure of poisson modeling
-
V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," Proc. ACM SIGCOMM '94 Conf., pp. 257-268, 1994.
-
(1994)
Proc. ACM SIGCOMM '94 Conf.
, pp. 257-268
-
-
Paxson, V.1
Floyd, S.2
-
29
-
-
33747578143
-
Dynamics of IP traffic: A study of the role of variability and the impact of control
-
A. Feldmann, A.C. Gilbert, P. Huang, and W. Willinger, "Dynamics of IP Traffic: A Study of the Role of Variability and the Impact of Control," Proc. ACM SIGCOMM '99 Conf., pp. 301-313, 1999.
-
(1999)
Proc. ACM SIGCOMM '99 Conf.
, pp. 301-313
-
-
Feldmann, A.1
Gilbert, A.C.2
Huang, P.3
Willinger, W.4
-
30
-
-
85013592037
-
Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level
-
W. Willinger, M.S. Taqqu, R. Sherman, and D.V. Wilson, "Self-Similarity through High-Variability: Statistical Analysis of Ethernet Lan Traffic at the Source Level," Proc. ACM SIGCOMM '95 Conf., pp. 100-113, 1995.
-
(1995)
Proc. ACM SIGCOMM '95 Conf.
, pp. 100-113
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
-
31
-
-
6944226924
-
Long-range dependence: Ten years of internet traffic modeling
-
Sept.-Oct.
-
T. Karagiannis, M. Molle, and M. Faloutsos, "Long-Range Dependence: Ten Years of Internet Traffic Modeling," IEEE Internet Computing, pp. 57-64, Sept.-Oct. 2004.
-
(2004)
IEEE Internet Computing
, pp. 57-64
-
-
Karagiannis, T.1
Molle, M.2
Faloutsos, M.3
-
33
-
-
0003893794
-
-
Philadelphia, Penn.: Soc. for Industrial and Applied Math.
-
Z. Bai, J. Demmel, J. Dongarra, A. Ruhe, and H. van der Vorst, Templates for the Solution of Algebraic Eigenvalue Problems: A Practical Guide. Philadelphia, Penn.: Soc. for Industrial and Applied Math., 2000.
-
(2000)
Templates for the Solution of Algebraic Eigenvalue Problems: A Practical Guide
-
-
Bai, Z.1
Demmel, J.2
Dongarra, J.3
Ruhe, A.4
Van Der Vorst, H.5
-
34
-
-
0003554146
-
-
The MathWorks, Inc., Natick, Mass.
-
MATLAB User's Guide, The MathWorks, Inc., Natick, Mass., 1998.
-
(1998)
MATLAB User's Guide
-
-
-
35
-
-
4043141148
-
Spectra and eigenvectors of scale-free networks
-
K.I. Goh, B. Kahng, and D. Kim, "Spectra and Eigenvectors of Scale-Free Networks," Physical Rev. E 64, 2001.
-
(2001)
Physical Rev. E
, vol.64
-
-
Goh, K.I.1
Kahng, B.2
Kim, D.3
-
37
-
-
79952839706
-
Inferring queue sizes in access networks by active measurement
-
Apr.
-
M. Claypool, R. Kinicki, M. Li, J. Nichols, and H. Wu, "Inferring Queue Sizes in Access Networks by Active Measurement," Proc. PAM (Passive and Active Measurement) Workshop, Apr. 2004.
-
(2004)
Proc. PAM (Passive and Active Measurement) Workshop
-
-
Claypool, M.1
Kinicki, R.2
Li, M.3
Nichols, J.4
Wu, H.5
-
38
-
-
17644420841
-
Quantifying the effects of recent protocol improvements to standards-track TCP
-
M. Weigle, K. Jeffay, and F.D. Smith, "Quantifying the Effects of Recent Protocol Improvements to Standards-Track TCP," Proc. 11th IEEE/ACM Int'l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm., 2003.
-
(2003)
Proc. 11th IEEE/ACM Int'l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm.
-
-
Weigle, M.1
Jeffay, K.2
Smith, F.D.3
-
41
-
-
0001647024
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM'2000 Conf., 2000.
-
(2000)
Proc. ACM SIGCOMM'2000 Conf.
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
42
-
-
30344466991
-
Hash-based IP traceback
-
Aug.
-
A.C. Shoeten, C. Partridge, L.A. Sanchez, C.e.E. Jones, F. Tchakountio, S.T. Kent, and W.T. Strayer, "Hash-Based IP Traceback," Proc. 2001 ACM SIGCOMM Conf., Aug. 2001.
-
(2001)
Proc. 2001 ACM SIGCOMM Conf.
-
-
Shoeten, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
43
-
-
0003552333
-
Controlling high bandwidth aggregates in the network
-
AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, Feb.
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, Feb. 2001.
-
(2001)
Technical Report
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
|