-
3
-
-
84858881721
-
-
Accessed 7 Sept 2004
-
Computer Emergency Response Team, CERT, http://www.cert.org. Accessed 7 Sept 2004.
-
-
-
-
4
-
-
33646822025
-
An active distributed defense system to protect web applications from DDoS attacks
-
Y. Xiang and W. Zhou, "An Active Distributed Defense System to Protect Web Applications from DDoS Attacks", iiWAS2004, pp. 559-568.
-
iiWAS2004
, pp. 559-568
-
-
Xiang, Y.1
Zhou, W.2
-
5
-
-
3042825073
-
IP traceback: A new denial-of-service deterrent?
-
H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent?", IEEE Security & Privacy, 1(3), 2003, pp.24-31.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 24-31
-
-
Aljifri, H.1
-
6
-
-
0012802798
-
-
CERT
-
A. Householder, A. Manion, L. Pesante, G.M. Weaver, and R. Thomas, "Managing the Threat of Denial-of-Service Attacks", CERT, 2001.
-
(2001)
Managing the Threat of Denial-of-service Attacks
-
-
Householder, A.1
Manion, A.2
Pesante, L.3
Weaver, G.M.4
Thomas, R.5
-
7
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
T. M. Gil, and M. Poletto, "MULTOPS: a data-structure for bandwidth attack detection", 10th Usenix Security Symposium, 2001, pp.23-38.
-
(2001)
10th Usenix Security Symposium
, pp. 23-38
-
-
Gil, T.M.1
Poletto, M.2
-
8
-
-
0035703761
-
Controlling high-bandwidth flows at the congested router
-
R. Mahajan, S. Floyd, and D. Wetherall, "Controlling High-Bandwidth Flows at the Congested Router", IEEE ICNP 2001, pp. 192-201.
-
IEEE ICNP 2001
, pp. 192-201
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
9
-
-
28844439716
-
A survey of active and passive defence mechanisms against DDoS attacks
-
School of Information Technology, Deakin University, Australia
-
Y. Xiang, W. Zhou, and M. Chowdhury, "A Survey of Active and Passive Defence Mechanisms against DDoS Attacks", Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia, 2004.
-
(2004)
Technical Report
, vol.TR C04-02
-
-
Xiang, Y.1
Zhou, W.2
Chowdhury, M.3
-
10
-
-
85084163540
-
Center-track: An IP overlay network for tracking DoS floods
-
R. Stone, "Center-Track: An IP Overlay Network for Tracking DoS Floods", 9th Usenix Security Symposium, 2000, pp.199-212.
-
(2000)
9th Usenix Security Symposium
, pp. 199-212
-
-
Stone, R.1
-
11
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source", LISA 2000, pp.319-327.
-
LISA 2000
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
12
-
-
0004075434
-
ICMP traceback messages
-
Network Working Group
-
S. M. Bellovin, "ICMP Traceback Messages", Internet Draft, Network Working Group, 2000.
-
(2000)
Internet Draft
-
-
Bellovin, S.M.1
-
13
-
-
84950242640
-
On design and evaluation of intention-driven ICMP traceback
-
A. Mankin, D. Massey, C.-L. Wu, S. F. Wu and L. Zhang, "On Design and Evaluation of Intention-Driven ICMP Traceback", Proc. of Computer Communications and Networks, 2001, pp.159-165.
-
(2001)
Proc. of Computer Communications and Networks
, pp. 159-165
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
14
-
-
0033650827
-
Trajectory sampling for direct traffic observation
-
N. G. Duffield and M. Grossglauser, "Trajectory sampling for direct traffic observation", ACM SIGCOMM 2000, pp.271-282.
-
ACM SIGCOMM 2000
, pp. 271-282
-
-
Duffield, N.G.1
Grossglauser, M.2
-
15
-
-
0036947597
-
Single-packet IP traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-Packet IP Traceback", IEEE/ACM Transactions on Networking, 10(6), 2002, pp.721-734.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
16
-
-
0036329754
-
Tracing network attacks to their sources
-
T. Baba and S. Matsuda, "Tracing Network Attacks to Their Sources", IEEE Internet Computing, 6(3), 2002, pp.20-26.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.3
, pp. 20-26
-
-
Baba, T.1
Matsuda, S.2
-
17
-
-
0035361712
-
Network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin and T. Anderson, "Network Support for IP Traceback", ACM/IEEE Transactions on Networking, 9(3), 2001, pp.226-237.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
18
-
-
0142199483
-
Tracing multiple attackers with Deterministic Packet Marking (DPM)
-
A. Belenky, and N. Ansari, "Tracing Multiple Attackers with Deterministic Packet Marking (DPM)", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2003, pp.49-52.
-
(2003)
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, pp. 49-52
-
-
Belenky, A.1
Ansari, N.2
-
19
-
-
0842310839
-
Defeating distributed denial-of-service attack with deterministic bit marking
-
Y. Kim, J.-Y. Jo, F. L. Merat, "Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking," IEEE GLOBECOM, pp.1363-1367, 2003.
-
(2003)
IEEE GLOBECOM
, pp. 1363-1367
-
-
Kim, Y.1
Jo, J.-Y.2
Merat, F.L.3
-
20
-
-
0003792670
-
Type of service in the internet protocol suite
-
Network Working Group
-
RFC1349, "Type of Service in the Internet Protocol Suite", Network Working Group, 1992.
-
(1992)
RFC1349
-
-
-
21
-
-
0003256793
-
Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 headers
-
Network Working Group
-
RFC2474, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", Network Working Group, 1998.
-
(1998)
RFC2474
-
-
-
22
-
-
0033204164
-
Providing guaranteed services without per flow management
-
I. Stocia, and H. Zhang, "Providing Guaranteed Services Without Per Flow Management", ACM SIGCOMM 1999, pp.81-94.
-
(1999)
ACM SIGCOMM
, pp. 81-94
-
-
Stocia, I.1
Zhang, H.2
-
23
-
-
0035331939
-
Congestion control mechanisms and the best effort service model
-
P. Gevros, J. Crowcroft, P. Kirstein, and S. Bhatti, "Congestion Control Mechanisms and the Best Effort Service Model", IEEE Network, 15(3), 2001, pp.16-26.
-
(2001)
IEEE Network
, vol.15
, Issue.3
, pp. 16-26
-
-
Gevros, P.1
Crowcroft, J.2
Kirstein, P.3
Bhatti, S.4
|