-
1
-
-
0003336855
-
Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing
-
Ferguson P., and Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267 (1998)
-
(1998)
RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
2
-
-
0033650584
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000, pp. 295-306.
-
-
-
-
3
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan R., Bellovin S.M., Floyd S., Ioannidis J., Paxson V., and Shenker S. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communications Review 32 3 (2002) 62-73
-
(2002)
ACM SIGCOMM Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
4
-
-
84904888755
-
-
J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of IEEE ICNP, 2002, pp. 312-321.
-
-
-
-
5
-
-
84954422497
-
-
A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 93-107.
-
-
-
-
6
-
-
3543097593
-
-
A. Yaar, A. Perrig, D. Song, SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks, in: IEEE Symposium on Security and Privacy, 2004, pp. 130-143.
-
-
-
-
7
-
-
33947326534
-
-
CERT advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. Available from: (1996).
-
-
-
-
8
-
-
33947305210
-
-
CERT advisory CA-1998-01 smurf IP denial-of-service attacks. Available from: (1998).
-
-
-
-
9
-
-
33947305900
-
-
CERT advisory CA-1996-01 UDP port denial-of-service attack. Available from: (1996).
-
-
-
-
10
-
-
84949938425
-
-
T. Aura, P. Nikander, J. Leiwo, DoS-resistant authentication with client puzzles, in: Proceedings of Security Protocols Workshop 2000, Lecture Notes in Computer Science, Vol. 2133, Cambridge, UK, 2000, pp. 170-181.
-
-
-
-
12
-
-
33947316709
-
-
J. Ioannidis, S.M. Bellovin, Implementing pushback: Router-based defense against DDoS attacks, in: Proceedings of NDSS (2002).
-
-
-
-
13
-
-
0036349004
-
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, L. Zhang, SAVE: source address validity enforcement protocol, in: Proceedings of IEEE Infocom, vol. 3, 2002, pp. 1557-1566.
-
-
-
-
16
-
-
84925368904
-
-
J. Bellardo, S. Savage, 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions, in: Proceedings of USENIX Security Symposium, Washington DC, 2003, pp. 15-28.
-
-
-
-
17
-
-
15944408818
-
-
Q. Gu, P. Liu, C.-H. Chu, Tactical bandwidth exhaustion in ad hoc networks, in: Proceedings of the 5th Annual IEEE Information Assurance Workshop, West Point, NY, 2004, pp. 257-264.
-
-
-
-
18
-
-
33947314594
-
-
C. Wullems, K. Tham, J. Smith, M. Looi, Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs, Tech. rep., Information Security Research Centre, Queensland University of Technology, Brisbane, Australia (2004).
-
-
-
-
19
-
-
85177224014
-
-
N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of ACM MobiCom, 2001, pp. 180-189.
-
-
-
-
20
-
-
11244252132
-
-
I. Aad, J. Hubaux, E. Knightly, Denial of service resilience in ad hoc networks, in: Proceedings of ACM MobiCom, 2004.
-
-
-
-
21
-
-
85177184765
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of ACM MobiCom, 2002, pp. 12-23.
-
-
-
-
22
-
-
1542317831
-
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: Proceedings of ACM workshop on Wireless security, 2003, pp. 30-40.
-
-
-
-
23
-
-
84903836776
-
-
P. Ning, K. Sun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, in: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, 2003, pp. 60-67.
-
-
-
-
24
-
-
84961572484
-
-
Y.-C. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 3-13.
-
-
-
-
25
-
-
33947315246
-
-
NS2, The network simulator. Available from: (2004).
-
-
-
-
27
-
-
33846606375
-
-
W. Yu, K.R. Liu, Defense against injecting traffic attacks in cooperative ad hoc networks, in: Proceedings of IEEE Globecom, 2005.
-
-
-
-
28
-
-
33846606856
-
-
Q. Gu, P. Liu, S. Zhu, C.-H. Chu, Defending against packet injection attacks in unreliable ad hoc networks, in: Proceedings of the IEEE Globecom, 2005.
-
-
-
-
29
-
-
0029514136
-
-
H. Chhaya, S. Gupta, Throughput and fairness properties of asynchronous data transfer methods in the IEEE 802.11 MAC protocol, in: Proceedings of the 6th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, 1995, pp. 613-617.
-
-
-
-
30
-
-
0041438381
-
-
M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, Performance anomaly of 802.11b, in: Proceedings of the IEEE Infocom, 2003, pp. 836-843.
-
-
-
-
31
-
-
0041973662
-
-
Z. Fu, P. Zerfos, K. Xu, H. Luo, S. Lu, L. Zhang, M. Gerla, The impact of multihop wireless channel on TCP throughput and loss, in: Proceedings of the IEEE Infocom, vol. 3, San Francisco, 2003, pp. 1744-1753.
-
-
-
-
32
-
-
0348195762
-
-
A. Wood, J. Stankovic, S. Son, JAM: a jammed-area mapping service for sensor networks, in: Proceedings of the 24th IEEE Real-Time Systems Symposium, 2003, pp. 286-297.
-
-
-
-
33
-
-
85177498900
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the ACM MobiCom, 2000, pp. 275-283.
-
-
-
-
34
-
-
85177498656
-
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the ACM MobiCom, ACM Press New York, NY, USA, Boston, Massachusetts, United States, 2000, pp. 255-265.
-
-
-
-
35
-
-
4544258840
-
-
Y.-A. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 135-147.
-
-
-
|