-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In NDSS, 2003.
-
(2003)
NDSS
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
3
-
-
84978369629
-
System support for bandwidth management and content adaptation in Internet applications
-
Sept.
-
D. G. Andersen et al. System support for bandwidth management and content adaptation in Internet applications. In OSDI, Sept. 2000.
-
(2000)
OSDI
-
-
Andersen, D.G.1
-
4
-
-
3543121457
-
Preventing Internet denial-of-service with capabilities
-
Nov.
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In HotNets, Nov. 2003.
-
(2003)
HotNets
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
5
-
-
84859685489
-
-
Arbor Networks, Inc. http://www.arbornetworks.com.
-
-
-
-
7
-
-
84859691471
-
-
A. Back. Hashcash. http://www.cypherspace.org/adam/hashcash/.
-
-
-
Back, A.1
-
8
-
-
3042671755
-
Resource containers: A new facility for resource management in server systems
-
Feb.
-
G. Banga, P. Druschel, and J. C. Mogul. Resource containers: A new facility for resource management in server systems. In OSDI, Feb. 1999.
-
(1999)
OSDI
-
-
Banga, G.1
Druschel, P.2
Mogul, J.C.3
-
9
-
-
84859692159
-
-
Cisco Guard
-
Cisco Guard, Cisco Systems, Inc. http://www.cisco.com.
-
-
-
-
10
-
-
84859692618
-
-
Criminal Complaint USA v. Ashley, Hall, Schictel, Roby, and Walker, Aug.
-
Criminal Complaint USA v. Ashley, Hall, Schictel, Roby, and Walker, Aug. 2004. http://www.reverse.net/operationcyberslam.pdf.
-
(2004)
-
-
-
11
-
-
18844375030
-
On memory-bound functions for fighting spam
-
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In CRYPTO, 2003.
-
(2003)
CRYPTO
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
12
-
-
0001126172
-
Pricing via processing or combatting junk mail
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In CRYPTO, 1992.
-
(1992)
CRYPTO
-
-
Dwork, C.1
Naor, M.2
-
13
-
-
84859685482
-
-
Emulab. http://www.emulab.net.
-
-
-
-
14
-
-
33645783230
-
An empirical study of "bogon" route advertisements
-
Jan.
-
N. Feamster, J. Jung, and H. Balakrishnan. An empirical study of "bogon" route advertisements. CCR, 35(1), Jan. 2005.
-
(2005)
CCR
, vol.35
, Issue.1
-
-
Feamster, N.1
Jung, J.2
Balakrishnan, H.3
-
15
-
-
0344583800
-
Packet-level traffic measurements from the Sprint IP backbone
-
C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, and C. Diot. Packet-level traffic measurements from the Sprint IP backbone. IEEE Network, 17(6), 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.6
-
-
Fraleigh, C.1
Moon, S.2
Lyles, B.3
Cotton, C.4
Khan, M.5
Moll, D.6
Rockell, R.7
Seely, T.8
Diot, C.9
-
16
-
-
14844282689
-
Guaranteeing access in spite of distributed service-flooding attacks
-
V. D. Gligor. Guaranteeing access in spite of distributed service-flooding attacks. In Intl. Wkshp. on Security Prots., 2003.
-
(2003)
Intl. Wkshp. on Security Prots.
-
-
Gligor, V.D.1
-
19
-
-
26844548971
-
-
Honeynet Project and Research Alliance Mar.
-
Honeynet Project and Research Alliance. Know your enemy: Tracking botnets. Mar. 2005. http://www.honeynet.org/papers/bots/.
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
-
20
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, 1999.
-
(1999)
NDSS
-
-
Juels, A.1
Brainard, J.2
-
21
-
-
36048986923
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In USENIX NSDI, May 2005.
-
(2005)
USENIX NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
22
-
-
33845220105
-
Designing DCCP: Congestion control without reliability
-
Sept.
-
E. Kohler, M. Handley, and S. Floyd. Designing DCCP: Congestion control without reliability. In SIGCOMM, Sept. 2006.
-
(2006)
SIGCOMM
-
-
Kohler, E.1
Handley, M.2
Floyd, S.3
-
23
-
-
33845403940
-
Building secure high-performance Web services with OKWS
-
June
-
M. Krohn. Building secure high-performance Web services with OKWS. In USENIX Technical Conference, June 2004.
-
(2004)
USENIX Technical Conference
-
-
Krohn, M.1
-
25
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
Dec.
-
D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. In Proc. IEEE ACSAC, Dec. 2001.
-
(2001)
Proc. IEEE ACSAC
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
27
-
-
84859685484
-
-
Mazu Networks, Inc. http://mazunetworks.com.
-
-
-
-
28
-
-
11144272176
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Apr.
-
J. Mirkovic and P. Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms. CCR, 34(2), Apr. 2004.
-
(2004)
CCR
, vol.34
, Issue.2
-
-
Mirkovic, J.1
Reiher, P.2
-
29
-
-
18744376590
-
Using graphic turing tests to counter automated DDoS attacks against Web servers
-
Oct.
-
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Mishra, and D. Rubenstein. Using graphic turing tests to counter automated DDoS attacks against Web servers. In ACM CCS, Oct. 2003.
-
(2003)
ACM CCS
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Mishra, V.5
Rubenstein, D.6
-
30
-
-
84859691016
-
Extortion via DDoS on the rise
-
May
-
Network World. Extortion via DDoS on the rise. May 2005. http://www.networkworld.com/news/2005/051605-ddos-extortion.html.
-
(2005)
Network World
-
-
-
32
-
-
84859693564
-
CMU student taps brain's game skills
-
Oct. 5
-
Pittsburgh Post-Gazette. CMU student taps brain's game skills. Oct. 5, 2003. http://www.post-gazette.com/pg/03278/228349.stm.
-
(2003)
Pittsburgh Post-gazette
-
-
-
33
-
-
84859685481
-
-
Prolexic Technologies, Inc. http://www.prolexic.com.
-
-
-
-
34
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Sept.
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In SIGCOMM, Sept. 2006.
-
(2006)
SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
35
-
-
27644465054
-
The design and implementation of a next generation name service for the Internet
-
Aug.
-
V. Ramasubramanian and E. G. Sirer. The design and implementation of a next generation name service for the Internet. In SIGCOMM, Aug. 2004.
-
(2004)
SIGCOMM
-
-
Ramasubramanian, V.1
Sirer, E.G.2
-
37
-
-
33845939331
-
-
SecurityFocus Aug.
-
SecurityFocus. FBI busts alleged DDoS mafia. Aug. 2004. http://www.securityfocus.com/news/9411.
-
(2004)
FBI Busts Alleged DDoS Mafia
-
-
-
38
-
-
79955747674
-
LADS: Large-scale automated DDoS detection system
-
June
-
V. Sekar, N. Duffield, O. Spatscheck, J. van der Merwe, and H. Zhang. LADS: Large-scale automated DDoS detection system. In USENIX Technical Conference, June 2006.
-
(2006)
USENIX Technical Conference
-
-
Sekar, V.1
Duffield, N.2
Spatscheck, O.3
Van Der Merwe, J.4
Zhang, H.5
-
39
-
-
33749052103
-
Mitigating DoS attack through selective bin verification
-
Nov.
-
M. Sherr, M. Greenwald, C. A. Gunter, S. Khanna, and S. S. Venkatesh. Mitigating DoS attack through selective bin verification. In 1st Wkshp. on Secure Netwk. Protcls., Nov. 2005.
-
(2005)
1st Wkshp. on Secure Netwk. Protcls.
-
-
Sherr, M.1
Greenwald, M.2
Gunter, C.A.3
Khanna, S.4
Venkatesh, S.S.5
-
41
-
-
33750361861
-
-
Spammer-X. Syngress
-
Spammer-X. Inside the SPAM Cartel. Syngress, 2004. Page 40.
-
(2004)
Inside the SPAM Cartel
, pp. 40
-
-
-
43
-
-
84859689607
-
TechWeb news
-
Oct.
-
TechWeb News. Dutch botnet bigger than expected. Oct. 2005. http://informationweek.com/story/showArticle.jhtm?articleID=172303265.
-
(2005)
Dutch Botnet Bigger Than Expected
-
-
-
44
-
-
33750329253
-
East European gangs in online protection racket
-
Nov.
-
The Register. East European gangs in online protection racket. Nov. 2003.
-
(2003)
The Register
-
-
-
47
-
-
2942728016
-
Telling humans and computers apart automatically
-
Feb.
-
L. von Ahn, M. Blum, and J. Langford. Telling humans and computers apart automatically. CACM, 47(2), Feb. 2004.
-
(2004)
CACM
, vol.47
, Issue.2
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
49
-
-
84954449334
-
Defending against denial-of-service attacks with puzzle auctions
-
May
-
X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symp. on Security and Privacy, May 2003.
-
(2003)
IEEE Symp. on Security and Privacy
-
-
Wang, X.1
Reiter, M.2
-
50
-
-
3543097593
-
SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
-
May
-
A. Yaar, A. Perrig, and D. Song. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In IEEE Symp. on Security and Privacy, May 2004.
-
(2004)
IEEE Symp. on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|