-
1
-
-
85084161486
-
"Inferring Internet Denial-of-Service Activity"
-
Usenix Assoc.
-
D. Moore, G.M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," Proc. Usenix Security Symp., Usenix Assoc., 2001; http://citeseer.ist.psu.edu/moore01inferring.html.
-
(2001)
Proc. Usenix Security Symp.
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
4
-
-
11144272176
-
"A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms"
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM Sigcomm Computer Comm. Rev., vol. 34, no. 2, 2004, pp. 39-53.
-
(2004)
ACM Sigcomm Computer Comm. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
5
-
-
0038742365
-
"Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites"
-
ACM Press
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. Int'l World Wide Web Conference, ACM Press, 2002, pp. 252-262.
-
(2002)
Proc. Int'l World Wide Web Conference
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
6
-
-
84904888755
-
"Attacking DDoS at the Source"
-
IEEE CS Press
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," Proc. 10th Int'l Conf. Network Protocols (ICNP 2002), IEEE CS Press, 2002, pp. 312-321.
-
(2002)
Proc. 10th Int'l Conf. Network Protocols (ICNP 2002)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
7
-
-
84942256107
-
"Statistical Approaches to DDoS Attack Detection and Response"
-
IEEE CS Press
-
L Feinstein et al., "Statistical Approaches to DDoS Attack Detection and Response," Proc. DARPA Information Survivability Conf. and Exposition, vol. 1, 2003, IEEE CS Press, pp. 303-314.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
-
8
-
-
1642535783
-
"A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods"
-
IEEE CS Press
-
R.B. Blazek et al., "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, 2001, pp. 220-226.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
, pp. 220-226
-
-
Blazek, R.B.1
-
9
-
-
0036343692
-
"Detecting SYN Flooding Attacks"
-
IEEE Press
-
H. Wang, D. Zhang, and K. Shin, "Detecting SYN Flooding Attacks," Proc. 21st Joint Conf. IEEE Computer and Comm. Societies (IEEE INFOCOM), IEEE Press, 2002, pp. 1530-1539.
-
(2002)
Proc. 21st Joint Conf. IEEE Computer and Comm. Societies (IEEE INFOCOM)
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
11
-
-
3543096392
-
"Fast Portscan Detection Using Sequential Hypothesis Testing"
-
IEEE CS Press
-
J. Jung et al., "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2004, pp. 211-225.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 211-225
-
-
Jung, J.1
-
12
-
-
0141427794
-
"A Signal Analysis of Network Traffic Anomalies"
-
ACM Press
-
P. Barford et al., "A Signal Analysis of Network Traffic Anomalies," Proc. ACM SIGCOMM Internet Measurement Workshop, ACM Press, 2002, pp. 71-82.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 71-82
-
-
Barford, P.1
-
14
-
-
0034301517
-
"The 1999 DARPA Off-Line Intrusion Detection Evaluation"
-
R. Lippmann et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation," Computer Networks, vol. 34, no. 4, 2000, pp. 579-595.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
|