-
1
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweden
-
S. Savage, D. Wetherall, A. Karlin and T. Anderson, "Practical network support for IP traceback," Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, pp. 295-306.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
2
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," Proceedings of IEEE INFOCOM 2001, pp. 878-886.
-
(2001)
Proceedings of IEEE INFOCOM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
5
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," Proceedings of IEEE INFOCOM 2001, pp. 338-347.
-
(2001)
Proceedings of IEEE INFOCOM
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
6
-
-
0036036842
-
Tradeoffs in probabilistic packet marking for IP traceback
-
May 19-21
-
M. Adler, "Tradeoffs in probabilistic packet marking for IP traceback," 34th ACM Symposium Theory of Computing (STOC), May 19-21, 2002, pp. 407-418.
-
(2002)
34th ACM Symposium Theory of Computing (STOC)
, pp. 407-418
-
-
Adler, M.1
-
7
-
-
0002624024
-
Tracing anonymous packets to their approximate source
-
New Orleans, USA, Dec.
-
Hal Burch and Bill Cheswick, "Tracing anonymous packets to their approximate source," 14th Systems Administration Conference, New Orleans, USA, Dec. 2000, pp. 313-322.
-
(2000)
14th Systems Administration Conference
, pp. 313-322
-
-
Burch, H.1
Cheswick, B.2
-
8
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
August
-
Robert Stone, "CenterTrack: an IP overlay network for tracking DoS floods," 9th USENIX Security Symposium, August 2000.
-
(2000)
9th USENIX Security Symposium
-
-
Stone, R.1
-
9
-
-
8344278876
-
ICMP traceback messages
-
March
-
Steven M. Bellovin, "ICMP Traceback messages," Internet Draft, March 2001.
-
(2001)
Internet Draft
-
-
Bellovin, S.M.1
-
10
-
-
84950242640
-
On design and evaluation of 'intention-driven' ICMP traceback
-
Allison Mankin, Dan Massey, Chien-Lung Wu, S. Felix Wu and Lixia Zhang, "On design and evaluation of 'intention-driven' ICMP traceback," 10th International Conference on Computer Communications and Networks (ICCCN) 2001, pp. 159-165.
-
(2001)
10th International Conference on Computer Communications and Networks (ICCCN)
, pp. 159-165
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
11
-
-
0034775309
-
Hash-based IP traceback
-
San Diego, California, USA, Aug. 27-31
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent and W. T. Strayer, "Hash-based IP traceback," Proceedings of ACM SIGCOMM, San Diego, California, USA, Aug. 27-31, 2001, pp. 3-14.
-
(2001)
Proceedings of ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
12
-
-
3543126644
-
Large-scale IP trace-back in high-speed Internet: Practical techniques and theoretical foundation
-
Berkeley, California, USA
-
J. Li, M. Sung, J. Xu and L. Li, "Large-scale IP trace-back in high-speed Internet: practical techniques and theoretical foundation," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, USA, pp. 115-129.
-
(2004)
IEEE Symposium on Security and Privacy (S&P)
, pp. 115-129
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
13
-
-
0003334329
-
Network ingress filtering: Defeating Denial of Service attacks which employ IP source address spoofing
-
D. Senie, "Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing," RFC 2827, 5 2000.
-
(2000)
RFC
, vol.2827
, pp. 5
-
-
Senie, D.1
-
14
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher and Lixia Zhang, "SAVE: source address validity enforcement protocol," Proceedings of IEEE INFOCOM 2002, pp. 1557-1566.
-
(2002)
Proceedings of IEEE INFOCOM
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
15
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S Bellvin, S. Floyd, J. Ioannidis, V. Paxson and S. Sherker, "Controlling high bandwidth aggregates in the network," Computer Communications Review (CCR) 32:3, July 2002, pp. 62-73.
-
(2002)
Computer Communications Review (CCR)
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellvin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Sherker, S.6
-
17
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
Berkeley, California, USA
-
A. Yaar, A. Perrig and D. Song, "Pi: a path identification mechanism to defend against DDoS attacks," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, USA, pp. 93-107.
-
(2003)
IEEE Symposium on Security and Privacy (S&P)
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
18
-
-
3543059601
-
StackPi: A new defensive mechnamism against IP spoofing and DDoS attacks
-
Carnegie Mellon University, February
-
A. Perrig, D. Song and A. Yaar, "StackPi: a new defensive mechnamism against IP spoofing and DDoS attacks," Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
-
(2003)
Technical Report
, vol.CMU-CS-02-208
-
-
Perrig, A.1
Song, D.2
Yaar, A.3
-
19
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
October 27-31, Washington, DC, USA
-
C. Jin, H. Wang and K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic," 10th ACM Conference on Computer and Communications Security (CCS), October 27-31, 2003, Washington, DC, USA, pp. 30-41.
-
(2003)
10th ACM Conference on Computer and Communications Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
20
-
-
3543097593
-
SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
-
Berkeley, California, USA
-
A. Yaar, A. Perrig and D. Song, "SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, USA, pp. 130-143.
-
(2004)
IEEE Symposium on Security and Privacy (S&P)
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
23
-
-
0003196107
-
RFC 2104 - HMAC: Key-ed hashing for message authentication
-
Feb.
-
H. Krawczyk, M. Bellare and R. Canetti, "RFC 2104 - HMAC: Key-ed hashing for message authentication," Internet RFC 2104, Feb. 1997
-
(1997)
Internet RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
24
-
-
0036602072
-
Hop integrity in computer networks
-
June
-
M. G. Gouda, E. N. Elnozahy, C. T. Huang and T. M. McGuire, "Hop integrity in computer networks," IEEE/ACM Transactions on Networking, Vol. 10, No. 3, June 2002, pp. 308-319.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.3
, pp. 308-319
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.T.3
McGuire, T.M.4
-
25
-
-
0036947484
-
Beyond folklore: Observations on fragmented traffic
-
December
-
C. Shannon, D. Moore and K. C. Claffy, "Beyond folklore: observations on fragmented traffic," IEEE/ACM Transactions on Networkings, Vol. 10, No. 6, December 2002, pp. 709-720.
-
(2002)
IEEE/ACM Transactions on Networkings
, vol.10
, Issue.6
, pp. 709-720
-
-
Shannon, C.1
Moore, D.2
Claffy, K.C.3
|