-
1
-
-
35048820228
-
Mayday: Distributed Filtering for Internet Services
-
D. Andersen. Mayday: Distributed Filtering for Internet Services. In 3rd Usenix USITS, 2003.
-
(2003)
3rd Usenix USITS
-
-
Andersen, D.1
-
3
-
-
85050149881
-
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks
-
K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX 2005, 2005.
-
(2005)
USENIX 2005
-
-
Argyraki, K.1
Cheriton, D.2
-
4
-
-
33847282023
-
-
DDoS attacks still pose threat to Internet
-
DDoS attacks still pose threat to Internet. BizReport, 11/4/03.
-
BizReport, 11/4/03
-
-
-
5
-
-
33847246509
-
-
Extortion via DDoS on the rise. Network World, 5/16/05.
-
Extortion via DDoS on the rise. Network World, 5/16/05.
-
-
-
-
6
-
-
0024889726
-
Analysis and Simulation of a Fair Queueing Algorithm
-
A. Demers, S. Keshav, and S. Shenker. Analysis and Simulation of a Fair Queueing Algorithm. In ACM SIGCOMM, 1989.
-
(1989)
ACM SIGCOMM
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
7
-
-
85084100614
-
Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems
-
P. Druschel and G. Banga. Lazy Receiver Processing (LRP): A Network Subsystem Architecture for Server Systems. In 2nd OSDI, 1996.
-
(1996)
2nd OSDI
-
-
Druschel, P.1
Banga, G.2
-
10
-
-
0011134472
-
Implementing Pushback: Router-Based Defense Against DoS Attacks
-
J. Ioannidis and S. Bellovin. Implementing Pushback: Router-Based Defense Against DoS Attacks. In NDSS, 2002.
-
(2002)
NDSS
-
-
Ioannidis, J.1
Bellovin, S.2
-
11
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In 2nd NSDI, May 2005.
-
(2005)
2nd NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
13
-
-
0040291388
-
The Click Modular Router
-
Aug
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM Transactions on Computer Systems, 18(3):263-297, Aug. 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
15
-
-
84948400810
-
A Scalable and Robust Solution for Bandwidth Allocation
-
S. Machiraju, M. Seshadri, and I. Stoica. A Scalable and Robust Solution for Bandwidth Allocation. In IWQoS'02, 2002.
-
(2002)
IWQoS'02
-
-
Machiraju, S.1
Seshadri, M.2
Stoica, I.3
-
16
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network. Computer Communications Review, 32(3), July 2002.
-
(2002)
Computer Communications Review
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
19
-
-
33847303706
-
-
http://www.netfilter.org/.
-
-
-
-
21
-
-
0001887844
-
Hash-Based IP Traceback
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-Based IP Traceback. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
22
-
-
0034997397
-
Advance and Authenticated Marking Schemes for IP Traceback
-
D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
-
(2001)
Proc. IEEE Infocom
-
-
Song, D.1
Perrig, A.2
-
23
-
-
0002709114
-
Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks
-
I. Stoica, S. Shenker, and H. Zhang. Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. In ACM SIGCOMM, 1998.
-
(1998)
ACM SIGCOMM
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
|