-
1
-
-
33746941368
-
-
S. Agarwal, T. Dawson, C. Tryfonas, DDoS mitigation via regional cleaning centers, Technical Report, RR04-ATL-013177, SPRINT ATL Research (January 2004).
-
-
-
-
2
-
-
33746975472
-
-
S.M. Bellovin, M. Leech, T. Taylor, ICMP traceback messages, in: draft-ietf-itrace-01.txt, internet-draft, October 2001. Expired draft.
-
-
-
-
3
-
-
25844486083
-
-
A. Bremler-Barr, H. Levy, Spoofing prevention method, in: IEEE INFOCOM, 2005.
-
-
-
-
4
-
-
85011016678
-
-
H. Burch, B. Cheswisk, Tracing anonymous packets to their approximate source, in: Proceedings of the 14th Systems Administration Conference (LISA), 2000.
-
-
-
-
5
-
-
33746952057
-
-
CAIDA, Nameserver DoS Attack, 〈http://www.caida.org/funding/dns-analysis/oct02dos.xml〉 (October 2002).
-
-
-
-
6
-
-
33746972855
-
-
CAIDA, SCO Offline from Denial-of-Service Attack, 〈http://www.caida.org/analysis/security/sco-dos/〉 (December 2003).
-
-
-
-
7
-
-
33746991363
-
-
CERT, MS-SQL Server Worm, Advisory CA-2003-04, 〈http://www.cert.org/advisories/CA-2003-04.html〉 (January 2003).
-
-
-
-
8
-
-
77953175954
-
-
W. chang Feng, The case for TCP/IP puzzles, in: Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture, 2003, pp. 322-327.
-
-
-
-
9
-
-
33746973872
-
-
CISCO, CISCO Group Management Protocol (CGMP), available at: 〈http://www.cisco.com/warp/public/473/22.html〉 (2006).
-
-
-
-
10
-
-
33747017887
-
-
Cooperative Association for Internet Data Analysis, 〈http://www.caida.org/〉.
-
-
-
-
12
-
-
33747006255
-
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina, Generic routing encapsulation (GRE), in: RFC 2784, 2000.
-
-
-
-
13
-
-
33746990829
-
-
P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP Source Address Spoofing, in: RFC 2827, 2001.
-
-
-
-
14
-
-
33747009010
-
-
Internet Mapping Project, 〈http://research.lumeta.com/ches/map/〉 (2004).
-
-
-
-
15
-
-
33747017889
-
-
J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium (NDSS), 2002.
-
-
-
-
16
-
-
33746965634
-
-
S. Kent, R. Atkinson, Security architecture for the Internet protocol, in: RFC 2401, 1998.
-
-
-
-
17
-
-
33746997066
-
-
A. Keromytis, V. Misra, D. Rubenstein, SOS: secure overlay services, in: ACM SIGCOMM, 2002.
-
-
-
-
18
-
-
33847100622
-
-
S.M. Khattab, R. Melhem, D. Mossé, T. Znati, Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks, in: Proceedings of the Second International Workshop on Security in Systems and Networks (SSN'06) (April 2006).
-
-
-
-
19
-
-
84893960790
-
-
S.M. Khattab, C. Sangpachatanaruk, R. Melhem, D. Mossé, T. Znati, Proactive server roaming for mitigating denial-of-service attacks, in: Proceedings of the International Conference on Information Technology: Research and Education (ITRE), 2003.
-
-
-
-
20
-
-
33746952058
-
-
S.M. Khattab, C. Sangpachatanaruk, R. Melhem, D. Mossé, T. Znati, Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks, Technical Report, TR-04-111, Department of Computer Science, University of Pittsburgh (September 2004).
-
-
-
-
21
-
-
2442597231
-
-
S.M. Khattab, C. Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati, Roaming honeypots for mitigating service-level denial-of-service attacks, in: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04), March 2004.
-
-
-
-
22
-
-
33746983600
-
-
S.M. Khattab, C. Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati, Roaming honeypots for mitigating service-level denial-of-service attacks, under submission, available at: 〈http://www.cs.pitt.edu/skhattab/roaming.pdf〉 (2006).
-
-
-
-
23
-
-
11244324912
-
-
B. Krishnamurthy, Mohonk: mobile honeypots to trace unwanted traffic early, in: Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting (NetT '04), 2004, pp. 277-282.
-
-
-
-
24
-
-
33746943321
-
-
A. Kuzmanovic, E. W. Knightly, Low-rate TCP-targeted denial of service attacks. (The Shrew vs. the Mice and Elephants), in: ACM SIGCOMM, 2003.
-
-
-
-
25
-
-
33746997549
-
-
J. Levine, R. LaBella, H. Owen, D. Contis, B. Culver, The use of honeynets to detect exploited systems across large enterprise networks, in: Proceedings of the IEEE Workshop on Information Assurance and Security, 2002.
-
-
-
-
26
-
-
3543126644
-
-
J. Li, M. Sung, J. Xu, L. Li, Large-Scale IP traceback in high-speed internet: practical techniques and theoretical foundation, in: Proceedings of IEEE Symposium on Security and Privacy, 2004.
-
-
-
-
27
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan R., Bellovin S.M., Floyd S., Ioannidis J., Paxson V., and Shenker S. Controlling high bandwidth aggregates in the network. ACM SIGCOMM CCR 32 3 (2002) 62-73
-
(2002)
ACM SIGCOMM CCR
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
28
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Mirkovic J., and Reiher P. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM CCR 34 2 (2004) 39-53
-
(2004)
ACM SIGCOMM CCR
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
29
-
-
33746990828
-
-
NetSec Group, 〈http://www.cs.pitt.edu/NETSEC〉.
-
-
-
-
30
-
-
84943761527
-
-
M. Oe, Y. Kadobayashi, S. Yamaguchi, An implementation of a hierarchical IP traceback architecture, in: Proceedings of the Symposium on Applications and the Internet Workshops (SAINT) Workshop on IPv6 and Applications, 2003.
-
-
-
-
31
-
-
0035010963
-
-
K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: IEEE INFOCOM, 2001, pp. 338-347.
-
-
-
-
32
-
-
33747001870
-
-
K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: ACM SIGCOMM, 2001.
-
-
-
-
33
-
-
33747002287
-
-
C. Perkins, IP mobility support, in: RFC 2002, 1996.
-
-
-
-
34
-
-
33746946081
-
-
A. Perrig, D. Song, A. Yaar, StackPi: a new defense mechanism against IP spoofing and DDoS attacks, Technical Report, CMU-CS-02-208, School of Computer Science, Carnegie Mellon, Pittsburgh, PA, USA (December 2002).
-
-
-
-
35
-
-
33746948458
-
-
T.H. Project, Know Your Enemy, Addison-Wisley, Indianapolis, IN, 2002.
-
-
-
-
36
-
-
33747028838
-
-
G. Sager, Security fun with OCxmon and cflowd, Internet2 working group meeting, November 1998.
-
-
-
-
37
-
-
33746955240
-
-
C. Sangpachatanaruk, S.M. Khattab, T. Znati, R. Melhem, D. Mossé, A simulation study of the proactive server roaming for mitigating denial of service attacks, in: Proceedings of the 36th Annual Simulation Symposium (ANSS), 2003.
-
-
-
-
38
-
-
33746953085
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: ACM SIGCOMM, 2000.
-
-
-
-
39
-
-
33746287499
-
-
V. Siris, I. Stavrakis, Provider-based deterministic packet marking against distributed DoS attacks, in: Proceedings of the International Workshop on Security in Systems and Networks (SSN), 2005.
-
-
-
-
40
-
-
33746945063
-
-
A.C. Snoeren, H. Balakrishnan, M.F. Kaashoek, The migrate approach to Internet mobility, in: Proceedings of the Oxygen Student Workshop, 2001.
-
-
-
-
41
-
-
0036947597
-
Single-packet IP traceback
-
Snoeren A.C., Partridge C., Sanchez L.A., Jones C.E., Tchakountio F., Schwartz B., Kent S.T., and Strayer W.T. Single-packet IP traceback. IEEE/ACM Transactions on Networking 10 6 (2002) 721-734
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
42
-
-
33746935704
-
-
Snort, 〈http://www.snort.com〉 (2004).
-
-
-
-
43
-
-
0034997397
-
-
D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: IEEE INFOCOM, 2001.
-
-
-
-
44
-
-
85084162258
-
-
S. Staniford, V. Paxson, N. Weaver, How to own the Internet in your spare time, in: Proceedings of the 11th USENIX Security Symposium, 2002.
-
-
-
-
45
-
-
85084163540
-
-
R. Stone, CenterTrack: An IP overlay network for tracking DoS floods, in: Proceedings of the Ninth USENIX Security Symposium, 2000.
-
-
-
-
46
-
-
0036375249
-
-
F. Sultan, K. Srinivasan, D. Iyer, L. Iftode, Migratory TCP: connection migration for service continuity in the Internet, in: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), 2002.
-
-
-
-
47
-
-
33746960773
-
-
The Network Simulator-ns-2, 〈http://www.isi.edu/nsnam/ns/〉.
-
-
-
-
48
-
-
14844334596
-
-
X. Wang, M. Reiter, Mitigating bandwidth-exhaustion attacks using congestion puzzles, in: Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2004.
-
-
-
-
49
-
-
84903755100
-
-
N. Weiler, Honeypots for distributed denial-of-service attacks, in: Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2002.
-
-
-
-
50
-
-
25844461391
-
-
A. Yaar, A. Perrig, D. Song, FIT: fast internet traceback, in: IEEE INFOCOM, 2005.
-
-
-
-
51
-
-
0038404196
-
-
D.K.Y. Yau, J.C.S. Lui, F. Liang, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, in: Proceedings of the IEEE International Workshop on Quality of Service (IWQoS), 2002.
-
-
-
|