-
1
-
-
0033650584
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000, Stockholm, Sweden, pp. 295-306.
-
-
-
-
2
-
-
0034997397
-
-
D. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of IEEE INFOCOM, 2001, pp. 878-886.
-
-
-
-
3
-
-
33749060709
-
-
D. Dean, M. Franklin, A. Stubblefield, An algebraic approach to IP traceback, in: Networks and Distributed System Security Symposium (NDSS), 2001, pp. 3-12.
-
-
-
-
4
-
-
0038011192
-
-
M.T. Goodrich, Efficient packet marking for large-scale IP traceback, in: 9th ACM Conference on Computer and Communications Security (CCS), 2002, Washington DC, USA, pp. 117-126.
-
-
-
-
5
-
-
0035010963
-
-
K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of IEEE INFOCOM, 2001, pp. 338-347.
-
-
-
-
6
-
-
0036036842
-
-
M. Adler, Tradeoffs in probabilistic packet marking for IP traceback, in: 34th ACM Symposium Theory of Computing (STOC), May 19-21, 2002, pp. 407-418.
-
-
-
-
7
-
-
33746280838
-
-
M. Ma, Tabu marking scheme for IP traceback, in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Denver, CO, April 2005.
-
-
-
-
8
-
-
33749076717
-
-
H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, 14th Systems Administration Conference, New Orleans, LA, USA, December 2000, pp. 313-322.
-
-
-
-
9
-
-
85084163540
-
-
R. Stone, CenterTrack: an IP overlay network for tracking DoS floods, in: 9th USENIX Security Symposium, August 2000.
-
-
-
-
10
-
-
33749060029
-
-
S.M. Bellovin, ICMP Traceback messages, Internet Draft, March 2001.
-
-
-
-
11
-
-
84950242640
-
-
A. Mankin, D. Massey, C.-L. Wu, S. Felix Wu, L. Zhang, On design and evaluation of "intention-driven" ICMP traceback, in: Proceedings of the 10th International Conference on Computer Communications and Networks (ICCCN) 2001, pp. 159-165.
-
-
-
-
12
-
-
0034775309
-
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, B. Schwartz, S.T. Kent, W.T. Strayer, Hash-based IP traceback, in: Proceedings of ACM SIGCOMM, San Diego, CA, USA, August 27-31, 2001, pp. 3-14.
-
-
-
-
13
-
-
3543126644
-
-
J. Li, M. Sung, J. Xu, L. Li, Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation, in: IEEE Symposium on Security and Privacy (S&P) 2004, Berkeley, CA, US., pp. 115-129.
-
-
-
-
14
-
-
33749053241
-
-
D. Senie, Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing, RFC 2827, 5, 2000.
-
-
-
-
15
-
-
0036349004
-
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, L. Zhang, SAVE: source address validity enforcement protocol, in: Proceedings of IEEE INFOCOM, 2002, pp. 1557-1566.
-
-
-
-
16
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan R., Bellvin S., Floyd S., Ioannidis J., Paxson V., and Sherker S. Controlling high bandwidth aggregates in the network. Computer Communications Review (CCR) 32 3 (2002) 62-73
-
(2002)
Computer Communications Review (CCR)
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellvin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Sherker, S.6
-
17
-
-
33749040737
-
-
J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Network and Distributed System Security Symposium (NDSS), 2002.
-
-
-
-
18
-
-
33744945767
-
-
A. Keromytis, V. Misra, D. Rubenstein, SOS: secure overlay services, in: Proceedings of ACM SIGCOMM, August 2002, pp. 61-72.
-
-
-
-
19
-
-
35048820228
-
-
D. Andersen, Mayday: distributed filtering for Internet services, in: Proceedings of USITS, 2003.
-
-
-
-
20
-
-
0037810705
-
-
A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: IEEE Symposium on Security and Privacy (S&P) 2003, Berkeley, CA, USA, pp. 93-107.
-
-
-
-
21
-
-
33749046554
-
-
A. Perrig, D. Song, A. Yaar, StackPi: a new defensive mechanism against IP spoofing and DDoS attacks, Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
-
-
-
-
22
-
-
17644411571
-
-
C. Jin, H. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: 10th ACM Conference on Computer and Communications Security (CCS) 2003, October 27-31, 2003, Washington, DC, USA, pp. 30-41.
-
-
-
-
23
-
-
3543097593
-
-
A. Yaar, A. Perrig, D. Song, SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks, in: IEEE Symposium on Security and Privacy (S&P) 2004, Berkeley, CA, USA, pp. 130-143.
-
-
-
-
25
-
-
33749076716
-
-
H. Krawczyk, M. Bellare, R. Canetti, RFC 2104-HMAC: Key-ed hashing for message authentication, Internet RFC 2104, February 1997.
-
-
-
-
26
-
-
0036602072
-
Hop integrity in computer networks
-
Gouda M.G., Elnozahy E.N., Huang C.T., and McGuire T.M. Hop integrity in computer networks. IEEE/ACM Transactions on Networking 10 3 (2002) 308-319
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.3
, pp. 308-319
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.T.3
McGuire, T.M.4
-
27
-
-
85084163167
-
-
T.M. Gil, M. Poletter, Multops: a data structure for bandwidth attack detection, in: Proceedings of USENIX Security Symposium, Washington, DC, August 2001.
-
-
-
-
28
-
-
0036343692
-
-
H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, June 2002, New York City, NY, pp. 1530-1539.
-
-
-
|