-
1
-
-
0036343692
-
Detecting SYN flooding attacks
-
New York, NY, USA
-
Wang H., Zhang D., Shin K.G.. Detecting SYN flooding attacks. In: Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society (INFO-COM), New York, NY, USA, 2002, 3: 1530-1539.
-
(2002)
Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society (INFO-COM)
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
2
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
Washington, DC, USA
-
Jin C., Wang H.N., Shin K.G.. Hop-count filtering: An effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS). Washington, DC, USA, 2003, 30-41.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.N.2
Shin, K.G.3
-
3
-
-
3042859154
-
Resisting SYN flood DDoS attacks with a SYN cache
-
San Francisco, CA, USA
-
Lemon J.. Resisting SYN flood DDoS attacks with a SYN cache. In: Proceedings of the BSDCon 2002 Conference, San Francisco, CA, USA, 2002, 89-97.
-
(2002)
Proceedings of the BSDCon 2002 Conference
, pp. 89-97
-
-
Lemon, J.1
-
5
-
-
0003553457
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Ferguson P., Senie D.. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. May 2000. [Online], http://www.ietf.org/rfc/rfc2827.txt.
-
(2000)
-
-
Ferguson, P.1
Senie, D.2
-
6
-
-
0035438826
-
What can you do with Traceroute
-
Branigan S., Burch H., Cheswick B., Wojcik F.. What can you do with Traceroute? IEEE Internet Computing, 2001, 5: 96.
-
(2001)
IEEE Internet Computing
, vol.5
, pp. 96
-
-
Branigan, S.1
Burch, H.2
Cheswick, B.3
Wojcik, F.4
-
7
-
-
2542625866
-
Notes on packet marking for IP traceback
-
Chinese source
-
Li De-Quan, Su Pu-Rui, Feng Deng-Guo. Notes on packet marking for IP traceback. Journal of Software, 2004, 15(2): 250-258 (in Chinese).
-
(2004)
Journal of Software
, vol.15
, Issue.2
, pp. 250-258
-
-
Li, D.-Q.1
Su, P.-R.2
Feng, D.-G.3
-
9
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom B. H.. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
11
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, SC, USA
-
Lippmann R., Fried D., Graf I., Haines J., Kendall K., Mc-Clung D., Weber D., Webster S., Cunninghan D. W. R., Zissman M.. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, Hilton Head, SC, USA, 2000, 2: 12-26.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
Mc-Clung, D.6
Weber, D.7
Webster, S.8
Cunninghan, D.W.R.9
Zissman, M.10
-
12
-
-
3543070612
-
IDR: An intrusion detection router for defending against distributed denial of-service (DDoS) attacks
-
Hong Kong
-
Chan E., Chan H., Chan K., Chan V., Chanson S. et at. IDR: An intrusion detection router for defending against distributed denial of-service (DDoS) attacks. In: Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks 2004 (ISPAN'04), Hong Kong, 2004, 581-586.
-
(2004)
Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks 2004 (ISPAN'04)
, pp. 581-586
-
-
Chan, E.1
Chan, H.2
Chan, K.3
Chan, V.4
Chanson, S.5
-
13
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
San Francisco, USA
-
Abdelsayed S., Glimsholt D., Leckie C., Ryan S., Shami S.. An efficient filter for denial-of-service bandwidth attacks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'03), San Francisco, USA, 2003, 3: 1353-1357.
-
(2003)
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM'03)
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
|