-
1
-
-
3042802739
-
Tracing the source of network attack: A technical, legal and societal problem
-
IEEE Press
-
S.C. Lee and C. Shields, "Tracing the Source of Network Attack: A Technical, Legal and Societal Problem," Proc. 2001 IEEE Workshop on Information Assurance and Security, IEEE Press, 2001, pp. 239-246.
-
(2001)
Proc. 2001 IEEE Workshop on Information Assurance and Security
, pp. 239-246
-
-
Lee, S.C.1
Shields, C.2
-
4
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
ACM Press
-
W. Lee and K. Park, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. SIGCOMM, ACM Press, 2001, pp. 15-26.
-
(2001)
Proc. SIGCOMM
, pp. 15-26
-
-
Lee, W.1
Park, K.2
-
5
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
May
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," Internet Eng. Task Force RFC 2827, May 2000; www.ietf.org/rfc/rfc2827.txt.
-
(2000)
Internet Eng. Task Force RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
6
-
-
0036329754
-
Tracing network attacks to their sources
-
T. Baba and S. Matsuda, "Tracing Network Attacks to Their Sources," IEEE Internet Computing, vol. 6, no. 3, 2002, pp. 20-26.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.3
, pp. 20-26
-
-
Baba, T.1
Matsuda, S.2
-
7
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
Usenix Assoc.
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. 9th Usenix Security Symp., Usenix Assoc., 2000, pp. 199-212.
-
(2000)
Proc. 9th Usenix Security Symp.
, pp. 199-212
-
-
Stone, R.1
-
8
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
Usenix Assoc.
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. 14th Conf. Systems Administration, Usenix Assoc., 2000, pp. 313-322.
-
(2000)
Proc. 14th Conf. Systems Administration
, pp. 313-322
-
-
Burch, H.1
Cheswick, B.2
-
9
-
-
0036947597
-
Single-packet IP traceback
-
A.C. Snoeren et al., "Single-Packet IP Traceback," IEEE/ACM Trans. Networking, vol. 10, no. 6, 2002, pp. 721-734.
-
(2002)
IEEE/ACM Trans. Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
-
10
-
-
2542523334
-
ICMP traceback messages
-
Internet Eng. Task Force, work in progress
-
S. Bellovin, M. Leech, and T. Taylor, "ICMP Traceback Messages," Internet Draft, Internet Eng. Task Force, 2003; work in progress.
-
(2003)
Internet Draft
-
-
Bellovin, S.1
Leech, M.2
Taylor, T.3
-
11
-
-
84950242640
-
On design and evaluation of 'intention-driven' ICMP traceback
-
IEEE CS Press
-
A. Mankin et al., "On Design and Evaluation of 'Intention-Driven' ICMP Traceback," Proc. IEEE Int'l Conf. Computer Comm. and Networks, IEEE CS Press, 2001. pp. 159-165.
-
(2001)
Proc. IEEE Int'l Conf. Computer Comm. and Networks
, pp. 159-165
-
-
Mankin, A.1
-
12
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
IEEE CS Press
-
W. Lee and K. Park, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Proc. IEEE INFOCOM, IEEE CS Press, 2001, pp. 338-347.
-
(2001)
Proc. IEEE INFOCOM
, pp. 338-347
-
-
Lee, W.1
Park, K.2
-
13
-
-
0036036842
-
Tradeoffs in probabilistic packet marking for IP traceback
-
ACM Press
-
M. Adler, "Tradeoffs in Probabilistic Packet Marking for IP Traceback," Proc. 34th ACM Symp. Theory of Computing, ACM Press, 2002, pp. 407-418.
-
(2002)
Proc. 34th ACM Symp. Theory of Computing
, pp. 407-418
-
-
Adler, M.1
-
14
-
-
0035361712
-
Network support for IP traceback
-
S. Savage et al., "Network Support for IP Traceback," IEEE/ACM Trans. Networking, vol. 9, no. 3, 2001, pp. 226-237.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
-
16
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
IEEE CS Press
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM, IEEE CS Press, 2001, pp. 878-886.
-
(2001)
Proc. IEEE INFOCOM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
17
-
-
85025403958
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," ACM Trans. Information and System Security, vol. 5, no. 2, 2002, pp. 119-137.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
19
-
-
0037224225
-
IP traceback using header compression
-
H. Aljifri, M. Smets, and A. Pons, "IP Traceback Using Header Compression," Computers & Security, vol. 22, no. 2, 2003, pp. 136-151.
-
(2003)
Computers & Security
, vol.22
, Issue.2
, pp. 136-151
-
-
Aljifri, H.1
Smets, M.2
Pons, A.3
-
20
-
-
0003314621
-
Internet protocol
-
Sept.
-
J. Postel, "Internet Protocol," Internet Eng. Task Force RFC 791, Sept. 1981; www.ietf.org/rfc/rfc0791.txt.
-
(1981)
Internet Eng. Task Force RFC
, vol.791
-
-
Postel, J.1
|