-
1
-
-
33847174871
-
-
http://www.sangoma.com.
-
-
-
-
4
-
-
33847100827
-
-
PC300, The Router Killer
-
PC300 - The Router Killer. http://www.cyclades.com/resources/?wp=6.
-
-
-
-
5
-
-
84868981924
-
-
December
-
OSS network routers. http://www.siriusit.co.uk/docs/doc.php?pageID= 8&typeID=3, December 2004.
-
(2004)
OSS network routers
-
-
-
6
-
-
33646920358
-
Scalable network path emulation
-
September
-
S. Agarwal, J. Sommers, and P. Barford. Scalable network path emulation. In Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), September 2005.
-
(2005)
Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Agarwal, S.1
Sommers, J.2
Barford, P.3
-
8
-
-
35048820228
-
Mayday: Distributed filtering for internet services
-
D. G. Andersen. Mayday: Distributed filtering for internet services. In Proceedings of USITS, 2003.
-
(2003)
Proceedings of USITS
-
-
Andersen, D.G.1
-
9
-
-
27644594567
-
Click vs. linux: Two efficient open-source IP network stacks for software routers
-
May
-
A. Bianco, R. Birke, D. Bolognesi, J. Finochietto, G. Galante, M. Mellia, M. Prashant, and F. Neri. Click vs. linux: Two efficient open-source IP network stacks for software routers. In IEEE Workshop on High Performance Switching and Routing, May 2005.
-
(2005)
IEEE Workshop on High Performance Switching and Routing
-
-
Bianco, A.1
Birke, R.2
Bolognesi, D.3
Finochietto, J.4
Galante, G.5
Mellia, M.6
Prashant, M.7
Neri, F.8
-
11
-
-
33847156226
-
-
D. Dittrich. The "stacheldraht" distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/stacheldraht.analysis, 1999.
-
(1999)
The stacheldraht
-
-
Dittrich, D.1
-
13
-
-
4243137229
-
Cyber defense technology networking and evaluation
-
March
-
R. Bajcsy et. al. Cyber defense technology networking and evaluation. Communications of the ACM, 47(3):58-61, March 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 58-61
-
-
Bajcsy, R.1
et., al.2
-
14
-
-
0003422785
-
The NewReno modification to TCP's fast recovery algorithm. RFC 2582
-
April
-
S. Floyd and T. Henderson. The NewReno modification to TCP's fast recovery algorithm. RFC 2582, April 1999.
-
(1999)
-
-
Floyd, S.1
Henderson, T.2
-
15
-
-
1642499093
-
Internet research needs better models
-
S. Floyd and E. Kohler. Internet research needs better models. SIGCOMM Comput. Commun. Rev., 33(1):29-34, 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.1
, pp. 29-34
-
-
Floyd, S.1
Kohler, E.2
-
16
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on internet resources
-
Oct
-
M. Guirguis, A. Bestavros, and I. Matta. Exploiting the transients of adaptation for RoQ attacks on internet resources. In Proceedings of ICNP, Oct 2004.
-
(2004)
Proceedings of ICNP
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
18
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
Feb
-
J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In NDSS, Feb 2002.
-
(2002)
NDSS
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
19
-
-
85013623251
-
Congestion avoidance and control
-
August
-
V. Jacobson. Congestion avoidance and control. In Proc. of the ACM SIGCOMM, volume 18, pages 314-329, August 1988.
-
(1988)
Proc. of the ACM SIGCOMM
, vol.18
, pp. 314-329
-
-
Jacobson, V.1
-
20
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DoS traffic
-
Oct
-
C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: An effective defense against spoofed DoS traffic. In Proc. of ACM CCS, pages 30-41, Oct 2003.
-
(2003)
Proc. of ACM CCS
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
21
-
-
0040291388
-
The Click modular router
-
August
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 18(3):263-297, August 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
22
-
-
8344224137
-
Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)
-
August
-
A. Kuzmanovic and E. W Knightly. Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants). In Proc. of ACM SIGCOMM, August 2003.
-
(2003)
Proc. of ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
23
-
-
0030609305
-
Dynamics of random early dectection
-
September
-
D. Lin and R. Morris. Dynamics of random early dectection. In Proc. of the ACM SIGCOMM, volume 27, pages 127-136, September 1997.
-
(1997)
Proc. of the ACM SIGCOMM
, vol.27
, pp. 127-136
-
-
Lin, D.1
Morris, R.2
-
25
-
-
0035703761
-
Controlling high-bandwidth flows at the congested router
-
November
-
R. Mahajan, S. Floyd, and D. Wetherall. Controlling high-bandwidth flows at the congested router. In P roc. of IEEE ICNP, November 2001.
-
(2001)
P roc. of IEEE ICNP
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
27
-
-
11144272176
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
April
-
J. Mirkovic and P. Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms. ACM Computer Communications Review, 34(2): 39-54, April 2004.
-
(2004)
ACM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
28
-
-
0031199999
-
Eliminating receive livelock in an interrupt-driven kernel
-
August
-
J. Mogul and K. K. Ramakrishnan. Eliminating receive livelock in an interrupt-driven kernel. ACM Transactions on Computer Systems, 15(3):217-252, August 1997.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.3
, pp. 217-252
-
-
Mogul, J.1
Ramakrishnan, K.K.2
-
31
-
-
0032651125
-
SRED: Stabilized RED
-
March
-
T. J. Ott, T. V. Lakshman, and L. H. Wong. SRED: Stabilized RED. In Proc. of IEEE INFOCOM, volume 3, pages 1346-1355, March 1999.
-
(1999)
Proc. of IEEE INFOCOM
, vol.3
, pp. 1346-1355
-
-
Ott, T.J.1
Lakshman, T.V.2
Wong, L.H.3
-
32
-
-
0032178265
-
Modeling TCP throughput: A simple model and its empirical validation
-
September
-
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: A simple model and its empirical validation. In P roc. of the ACM SIGCOMM, volume 28, pages 303-314, September 1998.
-
(1998)
P roc. of the ACM SIGCOMM
, vol.28
, pp. 303-314
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.3
Kurose, J.4
-
33
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
August
-
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proceedings of ACM SIGCOMM, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
35
-
-
84871549516
-
-
L. Rizzo, DummyNet. http://info.iet.unipi.it/~luigi/ip_dummynet/.
-
DummyNet
-
-
Rizzo, L.1
-
36
-
-
17744379157
-
Defending against low-rate TCP attacks: Dynamic detection and protection
-
Oct
-
H. Sun, J. Lui, and D. Yau. Defending against low-rate TCP attacks: Dynamic detection and protection. In Proceedings of ICNP, Oct 2004.
-
(2004)
Proceedings of ICNP
-
-
Sun, H.1
Lui, J.2
Yau, D.3
-
38
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
December
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. of OSDI, pages 255-270, December 2002.
-
(2002)
Proc. of OSDI
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
|