-
1
-
-
0003659023
-
CERT Advisory CA-2000-01: Denial-of-service developments
-
CERT Coordinate Center Available at
-
CERT Coordinate Center (2000) CERT Advisory CA-2000-01: denial-of-service developments. Available at http://www.cert.org/ advisories/CA-2000-01.html.
-
(2000)
-
-
-
2
-
-
0036343320
-
Scalable IP lookup for programmable routers
-
New York, June 23-27, IEEE, Washington, DC
-
Taylor, D. E., Lockwood, J. W., Sproull, T. S., Turner, J. S. and Parlour, D. B. (2002) Scalable IP lookup for programmable routers. In Proc. IEEE Infocom., New York, June 23-27, pp. 526-571. IEEE, Washington, DC.
-
(2002)
Proc. IEEE Infocom.
, pp. 526-571
-
-
Taylor, D.E.1
Lockwood, J.W.2
Sproull, T.S.3
Turner, J.S.4
Parlour, D.B.5
-
3
-
-
0032691593
-
OS support for general-purpose routers
-
Rio Rico, AZ, March 29-30, IEEE, Washington, DC
-
Peterson, L. L., Karlin, S. and Li, K. (1999) OS support for general-purpose routers. In Proc. Workshop on Hot Topics in Operating Systems, Rio Rico, AZ, March 29-30, pp. 38-43. IEEE, Washington, DC.
-
(1999)
Proc. Workshop on Hot Topics in Operating Systems
, pp. 38-43
-
-
Peterson, L.L.1
Karlin, S.2
Li, K.3
-
4
-
-
0034832776
-
Scheduling computations on a software-based router
-
Cambridge, MA, June 16-20, ACM Press, New York, NY
-
Qie, X., Bavier, A., Peterson, L. and Karlin, S. (2001) Scheduling computations on a software-based router. In Proc. ACM SIGMETRICS, Cambridge, MA, June 16-20, pp. 13-24. ACM Press, New York, NY.
-
(2001)
Proc. ACM SIGMETRICS
, pp. 13-24
-
-
Qie, X.1
Bavier, A.2
Peterson, L.3
Karlin, S.4
-
5
-
-
0035270344
-
Resource management in software-programmable router operating systems
-
Yau, D. K. Y. and Chen, X. (2001) Resource management in software-programmable router operating systems. IEEE J. Sel. Area. Commun., 19, 488-500.
-
(2001)
IEEE J. Sel. Area. Commun.
, vol.19
, pp. 488-500
-
-
Yau, D.K.Y.1
Chen, X.2
-
6
-
-
0022020346
-
Distributed snapshots: Determining global states of distributed systems
-
Chandy, K. M. and Lamport, L. (1985) Distributed snapshots: Determining global states of distributed systems. ACM Trans. Comput. Syst., 3, 63-75.
-
(1985)
ACM Trans. Comput. Syst.
, vol.3
, pp. 63-75
-
-
Chandy, K.M.1
Lamport, L.2
-
7
-
-
20444466125
-
Internet Mapping Project
-
Available at
-
Internet Mapping Project (1999) Available at http://research.lumeta.com/ ches/map/index.html.
-
(1999)
-
-
-
9
-
-
33745682779
-
-
Cooperative Association for Internet Data Analysis. Available at
-
Cooperative Association for Internet Data Analysis. (1997) Available at http://www.caida.org/.
-
(1997)
-
-
-
10
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden, August 28-September 1, ACM Press, New York, NY
-
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) Practical network support for IP traceback. In Proc. 2000 ACM SIGCOMM Conf., Stockholm, Sweden, August 28-September 1, pp. 295-306. ACM Press, New York, NY.
-
(2000)
Proc. 2000 ACM SIGCOMM Conf.
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
11
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Anchorage, AK, April 22-26, IEEE, Washington, DC
-
Song, D. X. and Perrig, A. (2001) Advanced and authenticated marking schemes for IP traceback. In Proc. IEEE INFOCOM '01, Anchorage, AK, April 22-26, pp. 878-886. IEEE, Washington, DC.
-
(2001)
Proc. IEEE INFOCOM '01
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
12
-
-
25844524821
-
-
Wu, S. F., Zhang, L., Massey, D. and Mankin, A. (2001) Intention-Driven ICMP Trace-Back, Internet Draft: Draft-wuitrace- intention-00.txt.
-
(2001)
Intention-Driven ICMP Trace-Back, Internet Draft: Draft-wuitrace- Intention-00.txt
-
-
Wu, S.F.1
Zhang, L.2
Massey, D.3
Mankin, A.4
-
13
-
-
84950242640
-
On design and evaluation of intention-driven ICMP traceback
-
Scottsdale, AZ, October 15-17, IEEE, Washington, DC
-
Mankin, A., Massey, D., Wu, C.-L., Wu, S. F. and Zhang, L. (2001) On design and evaluation of intention-driven ICMP traceback. In Proc. IEEE Int. Conf. Computer Communications and Networks, Scottsdale, AZ, October 15-17, pp. 159-165. IEEE, Washington, DC.
-
(2001)
Proc.IEEE Int. Conf. Computer Communications and Networks
, pp. 159-165
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
14
-
-
33745725083
-
Proactive protection: New techniques and best practices help service providers counter increase in cyber attacks
-
Barry, D. (2004) Proactive protection: New techniques and best practices help service providers counter increase in cyber attacks. Packet: Cisco Systems Users Magazine, 16, 64-68.
-
(2004)
Packet: Cisco Systems Users Magazine
, vol.16
, pp. 64-68
-
-
Barry, D.1
-
15
-
-
19744366570
-
OPERA: An opensource extensible router architecture for adding new network services and protocols
-
Chan, B. C., Lau, J. C. and Lui, J. C. (2005) OPERA: An opensource extensible router architecture for adding new network services and protocols. J. Syst. Softw., 78, 24-36.
-
(2005)
J. Syst. Softw.
, vol.78
, pp. 24-36
-
-
Chan, B.C.1
Lau, J.C.2
Lui, J.C.3
-
16
-
-
33745682772
-
-
The netfiler/iptables projects. Available at
-
The netfiler/iptables projects. (2000) Available at: http://www.netfilter. org.
-
(2000)
-
-
-
17
-
-
67649497897
-
Performance analysis of the Linux Firewall in a host
-
CiNIC - Calpoly intelligent NIC Project. Available at
-
Harris, J. and Melara, A. J. (2002) Performance analysis of the Linux Firewall in a host. CiNIC - Calpoly intelligent NIC Project. Available at http://www.ee.calpoly.edu/3comproject/.
-
(2002)
-
-
Harris, J.1
Melara, A.J.2
-
18
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidis, J., Paxson, V. and Shenker, S. (2002) Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev., 32, 62-73.
-
(2002)
ACM SIGCOMM Comput. Commun. Rev.
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
19
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington, DC, USA, November 18-22, ACM Press, New York, NY
-
Zou, C. C., Gong, W. and Towsley, D. (2002) Code red worm propagation modeling and analysis. In Proc. 9th ACM Conf. Computer and Communications Security, Washington, DC, USA, November 18-22, pp. 138-147. ACM Press, New York, NY.
-
(2002)
Proc. 9th ACM Conf. Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
20
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
Paxson, V. (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev., 31, 38-47.
-
(2001)
ACM SIGCOMM Comput. Commun. Rev.
, vol.31
, pp. 38-47
-
-
Paxson, V.1
-
21
-
-
0742276097
-
Inside the Slammer Worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S. and Weaver, N. (2003) Inside the Slammer Worm. IEEE Secur. Privacy, 1, 33-39.
-
(2003)
IEEE Secur. Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
22
-
-
1242287727
-
Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants
-
Karlsruhe, Germany, August 25-29, ACM Press, New York, NY
-
Kuzmanovic, A. and Knightly, E. W. (2003) Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants. In Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, August 25-29, pp. 75-86. ACM Press, New York, NY.
-
(2003)
Proc. ACM SIGCOMM 2003
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
23
-
-
17744370129
-
Low rate TCP denial-of-service attack detection at edge routers
-
Shevtekar, A., Anantharam, K. and Ansari, N. (2005) Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9, 262-265.
-
(2005)
IEEE Commun. Lett.
, vol.9
, pp. 262-265
-
-
Shevtekar, A.1
Anantharam, K.2
Ansari, N.3
-
24
-
-
17744379157
-
Defending against low-rate TCP attack: Dynamic detection and protection
-
Berlin, Germany, October 5-8, IEEE, Washington, DC
-
Sun, H., Lui, J. C. S. and Yau, D. K. Y. (2004) Defending against low-rate TCP attack: Dynamic detection and protection. In Proc. IEEE Int. Conf. Network Protocols (ICNP), Berlin, Germany, October 5-8, pp. 196-205. IEEE, Washington, DC.
-
(2004)
Proc. IEEE Int. Conf. Network Protocols (ICNP)
, pp. 196-205
-
-
Sun, H.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
25
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellowin, S. M. (1989) Security problems in the TCP/IP protocol suite. ACM Comput. Commun. Rev., 19, 32-48.
-
(1989)
ACM Comput. Commun. Rev.
, vol.19
, pp. 32-48
-
-
Bellowin, S.M.1
-
26
-
-
0003553457
-
RFC 2267: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Network Working Group, Request for Comments: 2267. Available at
-
Ferguson, P. and Senie, D. (1998) RFC 2267: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. Network Working Group, Request for Comments: 2267. Available at http://www.faqs.org/rfcs/rfc2267.html.
-
(1998)
-
-
Ferguson, P.1
Senie, D.2
-
27
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS Attack prevention in power-law internets
-
San Diego, CA, August 27-31, ACM Press, New York, NY
-
Park, K. and Lee, H. (2001) On the effectiveness of route-based packet filtering for distributed DoS Attack prevention in power-law internets. In Proc. SIGCOMM, San Diego, CA, August 27-31, pp. 15-26. ACM Press, New York, NY.
-
(2001)
Proc. SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
28
-
-
33745682768
-
-
Global Incident Analysis Center Egress Filtering v 0.2 2000. Available at
-
Global Incident Analysis Center Egress Filtering v 0.2 2000 Available at http://www.sans.org/y2k/egress.htm.
-
-
-
-
29
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Yau, D. K. Y., Lui, J. C. S., Liang, F. and Yeung, Y. (2005) Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw., 13, 29-42.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yeung, Y.4
-
30
-
-
0034775309
-
Hashbased IP traceback
-
San Diego, CA, August 27-31, ACM Press, New York, NY
-
Snoeren, A. C., Partridge, C., Sanchez, L. A., Jones, C. E., Tchakountio, F., Kent, S. T. and Strayer, W. T. (2001) Hashbased IP traceback. In Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication. San Diego, CA, August 27-31, pp. 3-14. ACM Press, New York, NY.
-
(2001)
Proc. ACM SIGCOMM 2001 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
31
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
Anchorage AK, April 22-26, IEEE Washington, DC
-
Park, K. and Lee, H. (2001) On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proc. IEEE INFOCOM '01, Anchorage, AK, April 22-26, pp. 338-347. IEEE, Washington, DC.
-
(2001)
Proc. IEEE INFOCOM '01
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
32
-
-
85180777711
-
An algebraic approach to IP traceback
-
San Diego, CA, February 7-9, Internet Society, ISOC, Reston, VA
-
Dean, D., Franklin, M. and Stubblefield, A. (2001) An algebraic approach to IP traceback. In Proc. Network and Distributed System Security Symp., NDSS '01, San Diego, CA, February 7-9, pp. 3-12. Internet Society, ISOC, Reston, VA.
-
(2001)
Proc. Network and Distributed System Security Symp., NDSS '01
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
33
-
-
21244446746
-
Perimeter-based defense against high bandwidth DDoS attacks
-
Chen, S. and Song, Q. (2005) Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans. Paral. Distrib. Syst., 16, 526-537.
-
(2005)
IEEE Trans. Paral. Distrib. Syst.
, vol.16
, pp. 526-537
-
-
Chen, S.1
Song, Q.2
-
34
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
Xu, J. and Lee, W. (2003) Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput., 52, 195-208.
-
(2003)
IEEE Trans. Comput.
, vol.52
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
35
-
-
25844469597
-
You can run, but you can't hide: An effective methodology to traceback DDoS attackers
-
Law, K. T., Lui, J. C. S. and Yau, D. K. Y. (2005) You can run, but you can't hide: An effective methodology to traceback DDoS attackers. IEEE Trans. Paral. Distrib. Syst., 15, 799-813.
-
(2005)
IEEE Trans. Paral. Distrib. Syst.
, vol.15
, pp. 799-813
-
-
Law, K.T.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
36
-
-
27844501172
-
Trade-offs in probabilistic packet marking for IP traceback
-
Adler, M. (2005) Trade-offs in probabilistic packet marking for IP traceback. J. ACM, 52, 217-244.
-
(2005)
J. ACM
, vol.52
, pp. 217-244
-
-
Adler, M.1
-
37
-
-
0142039750
-
IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks
-
Sung, M. and Xu, J. (2003) IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks. IEEE Trans. Paral. Distrib. Syst., 14, 861-872.
-
(2003)
IEEE Trans. Paral. Distrib. Syst.
, vol.14
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
38
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Belenky, A. and Ansari, N. (2003) IP traceback with deterministic packet marking. IEEE Commun. Lett., 7, 162-164.
-
(2003)
IEEE Commun. Lett.
, vol.7
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
40
-
-
20344392671
-
Tracing cyber attacks from the practical perspective
-
Gao, Z. and Ansari, N. (2005) Tracing cyber attacks from the practical perspective. IEEE Commun. Mag., 43, 123-131.
-
(2005)
IEEE Commun. Mag.
, vol.43
, pp. 123-131
-
-
Gao, Z.1
Ansari, N.2
-
41
-
-
0038318530
-
An effcient secure authenticated group key exchange algorithm for large and dynamic groups
-
October
-
Alves-Foss, J. (2000) An effcient secure authenticated group key exchange algorithm for large and dynamic groups. In Proc. 23rd National Information Systems Security Conf., October.
-
(2000)
Proc. 23rd National Information Systems Security Conf.
-
-
Alves-Foss, J.1
-
42
-
-
8344257973
-
Multiple source, multiple destination network tomography
-
Hong Kong, China, March 7-11, IEEE, Washington, DC
-
Rabbat, M., Nowak, R. and Coates, M. (2004) Multiple source, multiple destination network tomography. In Proc. IEEE Infocom 2004. Hong Kong, China, March 7-11, pp. 1628-1639. IEEE, Washington, DC.
-
(2004)
Proc. IEEE Infocom 2004
, pp. 1628-1639
-
-
Rabbat, M.1
Nowak, R.2
Coates, M.3
|