-
1
-
-
3042825073
-
IP Traceback: A New Denial-of-Service Deterrent?
-
H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent?", IEEE Security & Privacy, Vol.1, No.3, 2003, pp.24-31.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 24-31
-
-
Aljifri, H.1
-
2
-
-
2442583303
-
The LoSS Technique for Detecting New Denial of Service Attacks
-
W. H. Allen, G. A. Marin, "The LoSS Technique for Detecting New Denial of Service Attacks", Proc. of IEEE SoutheastCon 2004, pp.302-309.
-
(2004)
Proc. of IEEE SoutheastCon
, pp. 302-309
-
-
Allen, W.H.1
Marin, G.A.2
-
4
-
-
0038059205
-
IP Traceback With Deterministic Packet Marking
-
A. Belenky, and N. Ansari, "IP Traceback With Deterministic Packet Marking", IEEE Communications Letters, Vol.7, No.4, 2003, pp.162-164.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
7
-
-
33744807509
-
Simulation of Distributed Denial of Service Attacks
-
TR C4/09, School of Information Technology, Deakin University, Australia
-
R. C. Chen, W. Shi, and W. Zhou, "Simulation of Distributed Denial of Service Attacks", technical report, TR C4/09, School of Information Technology, Deakin University, Australia, 2004.
-
(2004)
technical report
-
-
Chen, R.C.1
Shi, W.2
Zhou, W.3
-
8
-
-
33846568804
-
-
Computer Emergency Response Team, CERT
-
Computer Emergency Response Team, CERT, http://www.cert.org.
-
-
-
-
14
-
-
4143081502
-
A Covariance Analysis Model for DDoS Attack Detection
-
S. Jin, D. S. Yeung, "A Covariance Analysis Model for DDoS Attack Detection", 2004 IEEE International Conference on Communications, Vol.4, 2004, pp.1882-1886.
-
(2004)
2004 IEEE International Conference on Communications
, vol.4
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.S.2
-
15
-
-
0842310839
-
Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking
-
Y. Kim J.-Y. Jo, F. L. Merat, "Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking", IEEE GLOBECOM 2003, pp.1363-1367.
-
(2003)
IEEE GLOBECOM
, pp. 1363-1367
-
-
Kim, Y.1
Jo, J.-Y.2
Merat, F.L.3
-
16
-
-
0942298614
-
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks
-
M. Li, C. Chi, W. Jia, W. Zhao, W. Zhou, J. Cao, D. Long and Q. Meng, "Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks", International Journal of Information Technology and Decision Making, Vol.2, No.3, 2003, pp.397-405.
-
(2003)
International Journal of Information Technology and Decision Making
, vol.2
, Issue.3
, pp. 397-405
-
-
Li, M.1
Chi, C.2
Jia, W.3
Zhao, W.4
Zhou, W.5
Cao, J.6
Long, D.7
Meng, Q.8
-
17
-
-
0003993827
-
-
MIT, Data Set
-
MIT 1998 DARPA Intrusion Detection Evaluation Data Set, http://www.ll.mit.edu/IST/ideval/data/198/198_data_index.html
-
(1998)
DARPA Intrusion Detection Evaluation
-
-
-
18
-
-
0000783098
-
Optimal detection of a change in distribution
-
M. Pollak, "Optimal detection of a change in distribution", Ann. Statist., Vol. 13, 1986, pp. 206-227.
-
(1986)
Ann. Statist
, vol.13
, pp. 206-227
-
-
Pollak, M.1
-
19
-
-
0035361712
-
Network Support for IP Traceback
-
S. Savage, D. Wetherall, A. Karlin and T. Anderson, "Network Support for IP Traceback", ACM/IEEE Transactions on Networking, Vol.9, No.3, 2001, pp.226-237.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
20
-
-
0036947597
-
Single-Packet IP Traceback
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-Packet IP Traceback", IEEE/ACM Transactions on Networking, Vol. 10, No. 6, 2002, pp.721-734.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
22
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods", 9th Usenix Security Symposium, 2000, pp.199-212.
-
(2000)
9th Usenix Security Symposium
, pp. 199-212
-
-
Stone, R.1
-
24
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
H. Wang, D. Zhang, K. G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.4, 2004, pp.193-208.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
27
-
-
0008922435
-
The XenoService A Distributed Defeat for Distributed Denial of Service
-
J. Yan, S. Early, R. Anderson, "The XenoService A Distributed Defeat for Distributed Denial of Service", Proc. of ISW 2000.
-
(2000)
Proc. of ISW
-
-
Yan, J.1
Early, S.2
Anderson, R.3
|