-
1
-
-
33645789038
-
-
Arbor networks. http://www.arbornetworks.com/resources_overview.php.
-
-
-
-
2
-
-
33645778005
-
-
Mazu profiler. http://www.mazunetworks.com/white_papers/.
-
Mazu Profiler
-
-
-
4
-
-
33645771704
-
-
Riverhead networks, http://www.riverhead.com/index2.html.
-
-
-
-
5
-
-
0034997113
-
Binomial congestion control algorithms
-
Anchorage, AK, April
-
D. Bansal and H. Balakrishnan. Binomial congestion control algorithms. In Proc. IEEE INFOCOM'01, pages 631-640, Anchorage, AK, April 2001.
-
(2001)
Proc. IEEE INFOCOM'01
, pp. 631-640
-
-
Bansal, D.1
Balakrishnan, H.2
-
6
-
-
0004075434
-
ICMP traceback messages
-
(work in progress), IETF
-
S. M. Bellovin. ICMP traceback messages. Internet draft (work in progress), IETF, 2000. http://wwwl .cs.columbia.edu/ smb/papers/draft-bellovin- itrace-00.txt.
-
(2000)
Internet Draft
-
-
Bellovin, S.M.1
-
7
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
IETF, January
-
P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. Request For Comments (Proposed Standard) RFC 2267, IETF, January 1998.
-
(1998)
Request for Comments (Proposed Standard) RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
8
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the Internet
-
S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. Netw., 7(4):458-472, 1999.
-
(1999)
IEEE/ACM Trans. Netw.
, vol.7
, Issue.4
, pp. 458-472
-
-
Floyd, S.1
Fall, K.2
-
9
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
S. Floyd and V. Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Trans. Netw., 1(4):397-413, 1993.
-
(1993)
IEEE/ACM Trans. Netw.
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
10
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Washington, DC, July
-
T. M. Gil and M. Poletto. MULTOPS: A data-structure for bandwidth attack detection. In Proc. USENIX Security Symposium, pages 23-28, Washington, DC, July 2001.
-
(2001)
Proc. USENIX Security Symposium
, pp. 23-28
-
-
Gil, T.M.1
Poletto, M.2
-
11
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on internet resources
-
M. Guirguis, A. Bestavros, and I. Malta. Exploiting the transients of adaptation for RoQ attacks on internet resources. In Proc. IEEEICNP'04, pages 184-195, 2004.
-
(2004)
Proc. IEEEICNP'04
, pp. 184-195
-
-
Guirguis, M.1
Bestavros, A.2
Malta, I.3
-
12
-
-
0011134472
-
Implementing pushback: Router-based defense against DDoS attacks
-
February
-
J. loannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proc. NDSS'02, February 2002.
-
(2002)
Proc. NDSS'02
-
-
Loannidis, J.1
Bellovin, S.M.2
-
13
-
-
33645793249
-
Guardian: A router mechanism for extreme overload prevention
-
August
-
H. Jiang and C. Dovrolis. Guardian: A router mechanism for extreme overload prevention. In Proc. ITCOM'02, August 2002.
-
(2002)
Proc. ITCOM'02
-
-
Jiang, H.1
Dovrolis, C.2
-
14
-
-
14944386850
-
On scalable attack detection in the network
-
Taormina, Sicily, Italy, October
-
R. R. Kompella, S. Singh, and G. Varghese. On scalable attack detection in the network. In Proc. IMC' 2004, pages 187-200, Taormina, Sicily, Italy, October 2004.
-
(2004)
Proc. IMC' 2004
, pp. 187-200
-
-
Kompella, R.R.1
Singh, S.2
Varghese, G.3
-
15
-
-
1242287727
-
Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants
-
A. Kuzmanovic and E. W. Knightly. Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In Proc. ACM SIGCOMM'03, pages 75-86, 2003.
-
(2003)
Proc. ACM SIGCOMM'03
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
16
-
-
0030609305
-
Dynamics of random early detection
-
D. Lin and R. Morris. Dynamics of random early detection. In Proc. ACM SIGCOMM'97, pages 127-137, 1997.
-
(1997)
Proc. ACM SIGCOMM'97
, pp. 127-137
-
-
Lin, D.1
Morris, R.2
-
17
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. SIGCOMM Comput. Commun. Rev., 32(3):62-73, 2002.
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
18
-
-
0035703761
-
Controlling high-bandwidth flows at the congested router
-
R. Mahajan and S. Floyd. Controlling high-bandwidth flows at the congested router. In Proc. lEEE ICNP'01, pages 192-201, 2001.
-
(2001)
Proc. LEEE ICNP'01
, pp. 192-201
-
-
Mahajan, R.1
Floyd, S.2
-
20
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev., 34(2):39-53, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
21
-
-
0012426522
-
Approximate fairness through differential dropping
-
R. Pan, L. Breslau, B. Prabhakar, and S. Shenker. Approximate fairness through differential dropping. SIGCOMM Comput. Commun. Rev., 33(2):23-39, 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev.
, vol.33
, Issue.2
, pp. 23-39
-
-
Pan, R.1
Breslau, L.2
Prabhakar, B.3
Shenker, S.4
-
22
-
-
0033905870
-
CHOKe, a stateless active queue management scheme for approximating fair bandwidth allocation
-
Tel-Aviv, Israel, March
-
R. Pan, B. Prabhakar, and K. Psounis. CHOKe, a stateless active queue management scheme for approximating fair bandwidth allocation. In Proc. IEEE INFOCOM'00, pages 942-951, Tel-Aviv, Israel, March 2000.
-
(2000)
Proc. IEEE INFOCOM'00
, pp. 942-951
-
-
Pan, R.1
Prabhakar, B.2
Psounis, K.3
-
23
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Andersen. Practical network support for IP traceback. In Proc. ACM SIGCOMM'00, pages 295-306, 2000.
-
(2000)
Proc. ACM SIGCOMM'00
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Andersen, T.4
-
24
-
-
0032178367
-
Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
-
I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queueing: achieving approximately fair bandwidth allocations in high speed networks. In Proc. ACM SIGCOMM'98, pages 118-130, 1998.
-
(1998)
Proc. ACM SIGCOMM'98
, pp. 118-130
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
-
25
-
-
0036343692
-
Detecting SYN flooding attacks
-
New York, NY, June
-
H. Wang, D. Zhang, and K. G. Shin. Detecting SYN flooding attacks. In Proc. IEEE INFOCOM'2002, pages 1530-1539, New York, NY, June 2002.
-
(2002)
Proc. IEEE INFOCOM'2002
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
26
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
Philadelphia, PA, August
-
K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: Behavior models and applications. In Proc. ACM SIGCOMM'05, Philadelphia, PA, August 2005.
-
(2005)
Proc. ACM SIGCOMM'05
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
27
-
-
33645776922
-
A double horizon defense scheme for robust regulation of malicious traffic
-
in preparation, University of Pennsylvania
-
Y. Xu and R. Guerin. A double horizon defense scheme for robust regulation of malicious traffic. Technical report in preparation, University of Pennsylvania, 2005.
-
(2005)
Technical Report
-
-
Xu, Y.1
Guerin, R.2
-
28
-
-
33645760181
-
On the robustness of router-based Denial-of-Service (DoS) defense systems
-
University of Pennsylvania, March
-
Y. Xu and R. Guerin. On the robustness of router-based denial-of-service (DoS) defense systems. Technical report, University of Pennsylvania, March 2005. Available at: http://einstein.seas.upenn.edu/mnlab/publications.html.
-
(2005)
Technical Report
-
-
Xu, Y.1
Guerin, R.2
|