-
2
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct.
-
R.K.C. Chang, "Defending against Flooding-based Distributed Denial-of-service Attacks: a Tutorial," IEEE Communications Magazine, Vol. 40(10), Oct. 2002, pp. 42-51.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
4
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DoS traffic
-
Oct.
-
C. Jin, H. Wang, and K. G. Shin, "Hop-Count Filtering: An Effective Defense against Spoofed DoS Traffic," The Tenth ACM International Conference on Computer and Communications Security (CCS), Oct. 2003, pp. 30-41.
-
(2003)
The Tenth ACM International Conference on Computer and Communications Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
6
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Jul.
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Computer Communications Review, 32(3), Jul. 2002, pp. 62-73.
-
(2002)
Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
7
-
-
84904888755
-
Attacking DDoS at the source
-
Nov.
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," The 10th IEEE International Conference on Network Protocols, Nov. 2002, pp. 312-321.
-
(2002)
The 10th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
9
-
-
84942253601
-
Cossack: Coordinated suppression of simultaneous attacks
-
Apr.
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "Cossack: Coordinated Suppression of Simultaneous Attacks," DARPA Information Survivability Conference and Exposition, Vol. 1, Apr. 2003, pp. 2-13.
-
(2003)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
10
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," The conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), Aug. 2000, pp.295-306.
-
(2000)
The Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM)
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
12
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
July
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," The 2000 USENIX Security Symposium, July 2000, pp. 199-212.
-
(2000)
The 2000 USENIX Security Symposium
, pp. 199-212
-
-
Stone, R.1
-
13
-
-
0142039750
-
IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
-
Sep.
-
M. Sung, J. Xu, "IP Traceback-based Intelligent Packet Filtering: a Novel Technique for Defending against Internet DDoS Attacks," IEEE Transactions on Parallel and Distributed Systems, Vol.14(9), Sep. 2003, pp. 861-872.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
14
-
-
34250620174
-
NetBouncer: Client-legitimacy-based high-performance DDoS filtering
-
Apr.
-
R. Thomas, B. Mark, T. Johnson, and J. Croall, "NetBouncer: Client-legitimacy-based High-performance DDoS Filtering," In DARPA Information Survivability Conference and Exposition, Vol. 1, Apr. 2003, pp. 14-25.
-
(2003)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
15
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
May
-
A. Yaar, A. Perrig, and D. Song, "Pi: a Path Identification Mechanism to Defend against DDoS Attacks," The 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 93-107.
-
(2003)
The 2003 IEEE Symposium on Security and Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
16
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
May
-
A. Yaar, A. Perrig, and D. Song, "SIFF: a Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," The 2004 IEEE Symposium on Security and Privacy, May 2004, pp. 130-143.
-
(2004)
The 2004 IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|