-
2
-
-
0003521721
-
-
(AF-TM-0121.000), The ATM Forum Technical Committee
-
Traffic Management Specification ver. 4.1, (AF-TM-0121.000), 1999, The ATM Forum Technical Committee.
-
(1999)
Traffic Management Specification Ver. 4.1
-
-
-
3
-
-
0036042175
-
Models and issues in data stream systems
-
Jun
-
B. Babcock, S Babu, M Datar, R Motwani, and J. Widom, "Models and issues in data stream systems," in Proc. ACM Symp. Principles Datab. Syst., Jun/ 2002, pp. 1-16.
-
(2002)
Proc. ACM Symp. Principles Datab. Syst.
, pp. 1-16
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
4
-
-
27544436002
-
-
Mar. [Online] revision 1.3
-
J Barlow and W Thrower, "TFN2K - An analysis," Mar. 2003. [Online]. Available: http://ecurityresponse.Symantec.com/avcenter/security/ Content/2000$_$02$_$10$_$a.html, (revision 1.3).
-
(2003)
TFN2K - An Analysis
-
-
Barlow, J.1
Thrower, W.2
-
5
-
-
8344278876
-
ICMP traceback messages
-
draft-ietf-itrace-01.txt, Oct.
-
S. M. Bellovin, M Leech, and T Taylor, "ICMP traceback messages," Internet Draft, draft-ietf-itrace-01.txt, Oct. 2001.
-
(2001)
Internet Draft
-
-
Bellovin, S.M.1
Leech, M.2
Taylor, T.3
-
6
-
-
14944374775
-
-
[Online]
-
D. J. Bernstein, "Syn cookies," 1996. [Online]. Available: http://cr.yp.to/syncookies.html
-
(1996)
Syn Cookies
-
-
Bernstein, D.J.1
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul.
-
B. Bloom, "Space/time trade-offs in hash coding with allowable errors," in Proc. Commun. ACM, Jul. 1970, vol. 13, pp. 422-426.
-
(1970)
Proc. Commun. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
8
-
-
8344278926
-
Network applications of Bloom filters: A survey, 2002
-
A. Broder and M. Mitzenmacher, "Network applications of Bloom filters: A survey, 2002," in Proc. 40th Annu. Allerton Conf. Commun., Control, Comput., 2002, pp. 636-646.
-
(2002)
Proc. 40th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
-
9
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
H. Burch and B Cheswick, "Tracing anonymous packets to their approximate source," in Proc. USENIX LISA, 2000, pp. 319-328.
-
(2000)
Proc. USENIX LISA
, pp. 319-328
-
-
Burch, H.1
Cheswick, B.2
-
10
-
-
3543070612
-
IDR: Intrusion detection router for defending distributed denial-of-service (DDoS) attack
-
May
-
E. Chan, "IDR: Intrusion detection router for defending distributed denial-of-service (DDoS) attack," in Proc ISPAN, May 2004, pp. 581-586.
-
(2004)
Proc ISPAN
, pp. 581-586
-
-
Chan, E.1
-
11
-
-
0003976889
-
-
C.ERT/Coordination Center, [Online]
-
K. J. Houle, G. M. Weaver, N. Long, and R. Thomas, "Trends in denial of service attack technology," C.ERT/Coordination Center, 2001. [Online]. Available: http://www.cert.org/archive/pdf/DoSS_Strends.pdf
-
(2001)
Trends in Denial of Service Attack Technology
-
-
Houle, K.J.1
Weaver, G.M.2
Long, N.3
Thomas, R.4
-
12
-
-
3242808612
-
-
[Online]
-
Computer Security Institute and Federal Bureau of Investigation, "CSI/FBI computer crime and security survey," 2003. [Online]. Available: http://www.gocsi.com
-
(2003)
CSI/FBI Computer Crime and Security Survey
-
-
-
13
-
-
0344559509
-
-
[Online]
-
U.S. Department of Homeland Security, "The national strategy to security Cyberspace," 2003. [Online]. Available: http://www.dhs.gov/ interweb/assetlibrary/National_Cyberspace_S trategy.pdf
-
(2003)
The National Strategy to Security Cyberspace
-
-
-
14
-
-
33744912228
-
New directions in traffic measurement and accounting
-
C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. SIGCOMM, 2002, pp. 323-336.
-
(2002)
Proc. SIGCOMM
, pp. 323-336
-
-
Estan, C.1
Varghese, G.2
-
15
-
-
0035012756
-
Stochastic fair blue: A queue management algorithm for enforcing fairness
-
Apr.
-
W. C. Feng, K. G. Shin, D. Kandlur, and D. Saha, "Stochastic fair blue: A queue management algorithm for enforcing fairness," in Proc. IEEE INFOCOM, Apr. 2001, pp. 1520-1529.
-
(2001)
Proc. IEEE INFOCOM
, pp. 1520-1529
-
-
Feng, W.C.1
Shin, K.G.2
Kandlur, D.3
Saha, D.4
-
16
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
IETF, May
-
P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing," IETF, RFC2827, May 2000.
-
(2000)
RFC2827
-
-
Ferguson, P.1
Senie, D.2
-
17
-
-
0029356674
-
Link-sharing and resource management models for packet networks
-
Aug.
-
S Floyd and V. Jacobson, "Link-sharing and resource management models for packet networks," IEEE/ACM Trans. Netw., vol. 3, no. 4, pp. 365-386, Aug. 1995.
-
(1995)
IEEE/ACM Trans. Netw.
, vol.3
, Issue.4
, pp. 365-386
-
-
Floyd, S.1
Jacobson, V.2
-
18
-
-
33749859549
-
Notes of class-based queueing: Setting parameters
-
[Online]
-
S. Floyd, "Notes of class-based queueing: Setting parameters," 1995. [Online], Available: ftp://ftp.ee.lbl.gov/papers/params.ps.Z, Informal notes
-
(1995)
Informal Notes
-
-
Floyd, S.1
-
19
-
-
33749871596
-
Single packet IP traceback in AS-level partial deployment scenario
-
Chao Gong, Trinh Le, Turgay Korkmaz, and Kamil Sarac, "Single packet IP traceback in AS-level partial deployment scenario," in Proc. IEEE GLOBECOM, 2005, pp. 1817-1821.
-
(2005)
Proc. IEEE GLOBECOM
, pp. 1817-1821
-
-
Gong, C.1
Le, T.2
Korkmaz, T.3
Sarac, K.4
-
20
-
-
1242287724
-
A framework for classifying denial of service attacks
-
Karlsruhe, Germany, Aug.
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, Karlsruhe, Germany, Aug. 2003, pp. 99-110.
-
(2003)
Proc. ACM SIGCOMM
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
21
-
-
85013623251
-
Congestion avoidance and control
-
V. acobson and M. J. Karels, "Congestion avoidance and control," in Proc. ACM SIGCOMM, 1988, pp. 314-329.
-
(1988)
Proc. ACM SIGCOMM
, pp. 314-329
-
-
Acobson, V.1
Karels, M.J.2
-
22
-
-
19544365925
-
Source-level IP packets bursts: Causes and effects
-
Miami, FL, Oct.
-
H. Jiang and C. Dovrolis, "Source-level IP packets bursts: Causes and effects," in Proc. ACM Internet Measurements Conf., Miami, FL, Oct. 2003, pp. 301-306.
-
(2003)
Proc. ACM Internet Measurements Conf.
, pp. 301-306
-
-
Jiang, H.1
Dovrolis, C.2
-
23
-
-
33749861353
-
-
S. Jin and D. S. Yeung, IEEE Commun. Soc., 2004
-
S. Jin and D. S. Yeung, IEEE Commun. Soc., 2004.
-
-
-
-
24
-
-
8344261545
-
PacketScore: Statistical-based overload control against distributed denial of service attacks
-
Mar.
-
Y. Kim, W. C. Lau, M. C. Chuah, and J. H. Chao, "PacketScore: Statistical-based overload control against distributed denial of service attacks," in Proc. IEEE INFOCOM, Mar. 2004, pp. 2594-2604.
-
(2004)
Proc. IEEE INFOCOM
, pp. 2594-2604
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, J.H.4
-
25
-
-
0348252034
-
A simple algorithm for finding frequent elements in streams and Bags
-
Mar.
-
R. M. Karp, S. Shenker, and C. H. Papadimitriou, "A simple algorithm for finding frequent elements in streams and Bags," ACM Trans. Datab. Syst., vol. 28, no. 1, pp. 51-55, Mar. 2003.
-
(2003)
ACM Trans. Datab. Syst.
, vol.28
, Issue.1
, pp. 51-55
-
-
Karp, R.M.1
Shenker, S.2
Papadimitriou, C.H.3
-
26
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
C. Krügel, T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection," ACM SAC, pp. 201-208, 2002.
-
(2002)
ACM SAC
, pp. 201-208
-
-
Krügel, C.1
Toth, T.2
Kirda, E.3
-
27
-
-
33749838207
-
-
[Online]
-
[Online], Available: http://www.tcpdump.org/
-
-
-
-
29
-
-
0003552333
-
Controlling high bandwidth aggregates in the network
-
Jul.
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," AC1RI & AT&T Labs Res., Tech. Rep., Jul. 2001.
-
(2001)
AC1RI & AT&T Labs Res., Tech. Rep.
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
30
-
-
4544235762
-
Xorshift RNGs
-
G. Marsaglia, "Xorshift RNGs," J. Statistical Software, vol. 8, no. 14, pp. 1-6, 2003.
-
(2003)
J. Statistical Software
, vol.8
, Issue.14
, pp. 1-6
-
-
Marsaglia, G.1
-
31
-
-
84904888755
-
Attacking DDoS at the source
-
Nov.
-
J. Mirkovic, P. Reiher, and G. Prier, "Attacking DDoS at the source," in Proc. ICNP, Nov. 2002, pp. 312-321.
-
(2002)
Proc. ICNP
, pp. 312-321
-
-
Mirkovic, J.1
Reiher, P.2
Prier, G.3
-
32
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet denial-of-service activity," in Proc. 10th USENIX Security, 2001, pp. 9-22.
-
(2001)
Proc. 10th USENIX Security
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
33
-
-
33749819153
-
-
[Online]
-
[Online]. Available: http://www-nrg.ee.lbl.gov/ns
-
-
-
-
35
-
-
33749829054
-
Defending against slave and reflector attacks
-
Invited Lecture
-
S. K. Rayanchu, "Defending against slave and reflector attacks," in Proc. Nat. Conf. Commun., 2005, Invited Lecture.
-
(2005)
Proc. Nat. Conf. Commun.
-
-
Rayanchu, S.K.1
-
38
-
-
84892425852
-
Beyond softnet
-
J. H. Salim, R. Olsson, and A. Kuznetsov, "Beyond softnet," in Proc. 5th Annu. Linux Showcase Conf., 2001, pp. 165-172.
-
(2001)
Proc. 5th Annu. Linux Showcase Conf.
, pp. 165-172
-
-
Salim, J.H.1
Olsson, R.2
Kuznetsov, A.3
-
39
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Aug. 2000, pp. 295-306.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
40
-
-
0034775309
-
Hash-based IP traceback
-
Aug.
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Hash-based IP traceback," in Proc. ACM SIGCOMM, Aug. 2001, pp. 3-14.
-
(2001)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
42
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in Proc. IEEE Symp. Security Privacy, 2003, pp. 93-107.
-
(2003)
Proc. IEEE Symp. Security Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
43
-
-
15544363902
-
Defending Against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam, "Defending Against distributed denial-of-service attacks with max-min fair server-centric router throttles," IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 29-42, 2005.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
|