-
1
-
-
11144272176
-
"A Taxonomy of DDoS Attacks and Defense Mechanisms"
-
Apr
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attacks and Defense Mechanisms," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-54, Apr. 2004.
-
(2004)
ACM SIGCOMM Computer Comm. Rev.
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
2
-
-
0001647024
-
"Practical Network Support for IP Traceback"
-
Aug
-
S. Savage, D. Wetherall, A.R. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM Conf., Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM Conf.
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
3
-
-
4544272175
-
"Controlling, High Bandwidth Aggregates in the Network"
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Proc. ACM SIGCOMM Computer Comm. Rev. (CCR), July 2002.
-
(2002)
Proc. ACM SIGCOMM Computer Comm. Rev. (CCR)
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
4
-
-
0001083965
-
"On the Eeffectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets"
-
Aug
-
K. Park and H. Lee, "On the Eeffectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM Conf., Aug. 2001.
-
(2001)
Proc. ACM SIGCOMM Conf.
-
-
Park, K.1
Lee, H.2
-
5
-
-
8344224137
-
"Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)"
-
Aug
-
A. Kuzmanovic and E.W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks (the Shrew vs. the Mice and Elephants)," Proc. ACM SIGCOMM Conf., Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM Conf.
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
8
-
-
0038322587
-
"Internet Indirection Infrastructure"
-
Aug
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, "Internet Indirection Infrastructure," Proc. ACM SIGCOMM Conf., Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM Conf.
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
9
-
-
33745709424
-
"Analyzing Secure Overlay Forwarding Systems Under Intelligent DDoS Attacks"
-
Technical Report OSU-CISRC-12/04-TR71, Dept. of Computer Science and Eng., The Ohio State Univ., June
-
X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "Analyzing Secure Overlay Forwarding Systems Under Intelligent DDoS Attacks," Technical Report OSU-CISRC-12/04-TR71, Dept. of Computer Science and Eng., The Ohio State Univ., June 2004.
-
(2004)
-
-
Wang, X.1
Chellappan, S.2
Boyer, P.3
Xuan, D.4
-
10
-
-
85084163540
-
"Centertrack: An IP Overlay Network for Tracking DoS Floods"
-
Aug
-
R. Stone, "Centertrack: An IP Overlay Network for Tracking DoS Floods," Proc. Ninth USENIX Security Symp., Aug. 2000.
-
(2000)
Proc. Ninth USENIX Security Symp.
-
-
Stone, R.1
-
11
-
-
0036036742
-
"Resilient Overlay Networks"
-
Oct
-
D. Andersen, H. Balakrishnan, M. Kaashoek, and R. Morris, "Resilient Overlay Networks," Proc. 18th ACM Symp. Operating Systems Principles (SOSP), Oct. 2001.
-
(2001)
Proc. 18th ACM Symp. Operating Systems Principles (SOSP)
-
-
Andersen, D.1
Balakrishnan, H.2
Kaashoek, M.3
Morris, R.4
-
15
-
-
0002054934
-
"Crowds: Anonymity for Web Transactions"
-
Nov
-
M. Reiter and A. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, Nov. 1998.
-
(1998)
ACM Trans. Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
|