-
2
-
-
33947706918
-
-
Aura T, Nikander P, Leiwo J. DoS-resistant authentication with client puzzles. Cambridge security protocols workshop 2000. Lecture notes in computer science. Berlin: Springer; 2000.
-
-
-
-
3
-
-
33947706380
-
-
Bellovin SM. ICMP traceback messages. IETF, draft-bellovin-itrace-05.txt, March 2000, work in progress.
-
-
-
-
4
-
-
33947630939
-
-
Bernstein DJ. SYN cookies. 1997. http://cr.yp.to/syncookies.html
-
-
-
-
6
-
-
33947689336
-
-
Computer Emergency Response Team. CERT advisory CA-1998-01 Smurf IP denial-of-service attacks. January 1998, http://www.cert.org/advisories/CA-1998-01.html
-
-
-
-
7
-
-
33947639152
-
-
Computer Emergency Response Team. CERT advisory CA-2003-20 W32/blaster worm. August 2003, http://www.cert.org/advisories/CA-2003-20.html
-
-
-
-
8
-
-
21244446746
-
-
Chen S, Song Q. Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans Parallel Distributed Syst 2005;16(7).
-
-
-
-
9
-
-
33947658576
-
-
Dean D, Stubblefield A. Using client puzzles to protect TLS: Tenth Annual USENIX security symposium; 2001.
-
-
-
-
10
-
-
33947658056
-
-
Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, IETF, RFC 2267, Janurary 1998.
-
-
-
-
11
-
-
33947641746
-
-
Gibson S. The strange tale of the denial of service attacks against GRC.COM. 2002, http://grc.com/dos/grcdos.htm.
-
-
-
-
13
-
-
0009771253
-
-
Prentice-Hall PTR, Englewood Cliffs, NJ ISBN: 0-13-046019-2
-
Kaufman C., Perlman R., and Speciner M. Network security. 2nd ed (2002), Prentice-Hall PTR, Englewood Cliffs, NJ ISBN: 0-13-046019-2
-
(2002)
Network security. 2nd ed
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
16
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan P., Bellovin S.M., Floyd S., Ioannidis J., Paxson V., and Shenker S. Controlling high bandwidth aggregates in the network. Comput Commun Rev 32 3 (2002) 62-73
-
(2002)
Comput Commun Rev
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, P.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
19
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
Park K., and Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Proceedings of the ACM SIGCOMM'2001 (August 2001)
-
(2001)
Proceedings of the ACM SIGCOMM'2001
-
-
Park, K.1
Lee, H.2
-
20
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attacks
-
Park K., and Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attacks. Proceedings of the IEEE INFOCOM'2001 (March 2001)
-
(2001)
Proceedings of the IEEE INFOCOM'2001
-
-
Park, K.1
Lee, H.2
-
23
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Schuba C., Krsul I., Kuhn M., Spafford E., Sundaram A., and Zamboni D. Analysis of a denial of service attack on TCP. Proceedings of the IEEE symposium on security and privacy (1997)
-
(1997)
Proceedings of the IEEE symposium on security and privacy
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
24
-
-
0001887844
-
Hash-based IP traceback
-
Snoren A.C., Partridge C., Sanchez L.A., Jones C.E., Tchakountio F., Kent S.T., et al. Hash-based IP traceback. Proceedings of the ACM SIGCOMM'2001 (August 2001)
-
(2001)
Proceedings of the ACM SIGCOMM'2001
-
-
Snoren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
-
28
-
-
0142039750
-
IP Traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks
-
Sung M., and Xu J. IP Traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks. IEEE Trans Parallel Distributed Syst 14 9 (2003) 861-872
-
(2003)
IEEE Trans Parallel Distributed Syst
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
29
-
-
0038825046
-
-
Wang X, Reiter MK. Defending against denial-of-service attacks with puzzle auctions. IEEE symposium on security and privacy; May 2003.
-
-
-
-
31
-
-
33947680865
-
-
Wu SF, Zhang L, Massey D, Mankin A. Intention-driven ICMP trace-back, IETF, internet draft, draft-wu-itrace-intention-00.txt February 2001, work in progress.
-
-
-
-
32
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
Xu J., and Lee W. Sustaining availability of web services under distributed denial of service attacks. IEEE Trans Comput 52 2 (2003) 195-208
-
(2003)
IEEE Trans Comput
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
|