-
1
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
ABDELSAYED, S., GLIMSHOLT, D., LECKIE, C., RYAN, S., AND SHAMI, S. 2003. An efficient filter for denial-of-service bandwidth attacks. In Proceedings of the 46th IEEE Global Telecommunications Conference (GLOBECOM'08). 1353-1357.
-
(2003)
Proceedings of the 46th IEEE Global Telecommunications Conference (GLOBECOM'08)
, pp. 1353-1357
-
-
ABDELSAYED, S.1
GLIMSHOLT, D.2
LECKIE, C.3
RYAN, S.4
SHAMI, S.5
-
2
-
-
34147178265
-
Worldwide ISP security report. Whitepaper
-
ARBOR, Lerington, MA
-
ARBOR. 2005. Worldwide ISP security report. Whitepaper. Arbor Networks, Lerington, MA.
-
(2005)
Arbor Networks
-
-
-
3
-
-
47649087420
-
-
version 4 routers. RFC, Internet Engineering Task Force IETF, Go online to
-
BAKER, F. 1995. Requirements for IP version 4 routers. RFC 1812. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
(1812)
Requirements for IP
-
-
BAKER, F.1
-
6
-
-
1642535783
-
A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods
-
BLAŽEK, R. B., KIM, H., ROZOVSKII, B., AND TARTAKOVSKY, A. 2001. A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods. In Proceedings of the 2001 IEEE Systems, Man and Cybernetics Information Assurance Workshop.
-
(2001)
Proceedings of the 2001 IEEE Systems, Man and Cybernetics Information Assurance Workshop
-
-
BLAŽEK, R.B.1
KIM, H.2
ROZOVSKII, B.3
TARTAKOVSKY, A.4
-
7
-
-
0014814325
-
-
BLOOM, B. H. 1970. Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13, 7 (Jul.), 422-426.
-
BLOOM, B. H. 1970. Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13, 7 (Jul.), 422-426.
-
-
-
-
10
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study
-
Seattle, WA
-
CABRERA, J. B. D., LEWIS, L., QIN, X., LEE, W., PHASANTH, R. K., RAVICHANDRAN, B., AND MEHRA, R. K. 2001. Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study. In Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management (Seattle, WA). 609-622.
-
(2001)
Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management
, pp. 609-622
-
-
CABRERA, J.B.D.1
LEWIS, L.2
QIN, X.3
LEE, W.4
PHASANTH, R.K.5
RAVICHANDRAN, B.6
MEHRA, R.K.7
-
11
-
-
34147105029
-
-
CAIDA, online to
-
CAIDA. 2006. Nameserver DoS attack October 2002. Go online to http://www.caida.org/funding/dns-analysis/oct02dos.xml.
-
(2006)
Nameserver DoS attack October 2002. Go
-
-
-
16
-
-
34147097571
-
-
CERT, online to
-
CERT. 2006. CERT/CC statistics. Go online to http://www.cert.org/stats/ cert_stats.html.
-
(2006)
CERT/CC statistics. Go
-
-
-
17
-
-
0036804084
-
-
CHANG, R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Mag. 40, 10 (Oct.), 42-51.
-
CHANG, R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Mag. 40, 10 (Oct.), 42-51.
-
-
-
-
21
-
-
33144480671
-
Denial of service against the domain name system
-
CHEUNG, S. 2006. Denial of service against the domain name system. IEEE Sec. Pri. 4, 1, 40.
-
(2006)
IEEE Sec. Pri
, vol.4
, Issue.1
, pp. 40
-
-
CHEUNG, S.1
-
22
-
-
84967701397
-
The design philosophy of the DARPA Internet protocols
-
Stanford, CA
-
CLARK, D.D. 1988. The design philosophy of the DARPA Internet protocols. In Proceedings of SIGCOMM (Stanford, CA). 106-114.
-
(1988)
Proceedings of SIGCOMM
, pp. 106-114
-
-
CLARK, D.D.1
-
23
-
-
34147119193
-
-
DAVIS, M. 2006. Building better bots: Open-source processes enable production-grade malware. Sage: Security Vision from McAfee Avert Labs 1, 1 (Jul.), 26-35.
-
DAVIS, M. 2006. Building better bots: Open-source processes enable production-grade malware. Sage: Security Vision from McAfee Avert Labs 1, 1 (Jul.), 26-35.
-
-
-
-
24
-
-
85025403958
-
-
DEAN, D., FHANKLIN, M., AND STUBBLEFIELD, A. 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Sec. 5, 2 (May), 119-137.
-
DEAN, D., FHANKLIN, M., AND STUBBLEFIELD, A. 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Sec. 5, 2 (May), 119-137.
-
-
-
-
25
-
-
34147094288
-
-
DEERING, S. AND HINDEN, R. 1998. Internet protocol, version 6 (IPv6) specification. RFC 2401. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
DEERING, S. AND HINDEN, R. 1998. Internet protocol, version 6 (IPv6) specification. RFC 2401. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
-
-
-
26
-
-
0023294428
-
An intrusion-detection model
-
DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2, 222-232.
-
(1987)
IEEE Trans. Softw. Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
DENNING, D.E.1
-
27
-
-
85006413597
-
-
DIETRICH, S., LONG, N., AND DITTRICH, D. 2000. Analyzing distributed denial of service attack tools: The shaft case. In Proceedings of the 14th Systems Administration Conference (New Orleans, LA). 329-339.
-
DIETRICH, S., LONG, N., AND DITTRICH, D. 2000. Analyzing distributed denial of service attack tools: The shaft case. In Proceedings of the 14th Systems Administration Conference (New Orleans, LA). 329-339.
-
-
-
-
28
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
EVANS, D. AND LAROCHELLE, D. 2002. Improving security using extensible lightweight static analysis. IEEE Softw. 19, 1, 42-51.
-
(2002)
IEEE Softw
, vol.19
, Issue.1
, pp. 42-51
-
-
EVANS, D.1
LAROCHELLE, D.2
-
29
-
-
34147154230
-
-
FERGUSON, P. AND SENIE, D. 2000. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
FERGUSON, P. AND SENIE, D. 2000. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
-
-
-
30
-
-
0027647490
-
-
FLOYD, S. AND JACOBSON, V. 1993. Random early detection gateways for congestion avoidance. IEEE / ACM Trans. Netw. 1, 4 (Aug.), 397-413.
-
FLOYD, S. AND JACOBSON, V. 1993. Random early detection gateways for congestion avoidance. IEEE / ACM Trans. Netw. 1, 4 (Aug.), 397-413.
-
-
-
-
31
-
-
0029356674
-
-
FLOYD, S. AND JACOBSON, V. 1995. Link-sharing and resource management models for packet networks. IEEE/ACM Trans. Netw. 3, 4 (Aug.), 365-386.
-
FLOYD, S. AND JACOBSON, V. 1995. Link-sharing and resource management models for packet networks. IEEE/ACM Trans. Netw. 3, 4 (Aug.), 365-386.
-
-
-
-
32
-
-
0002467033
-
Architecture for an artificial immune system
-
FORREST, S. AND HOFMEYR, S. 1999. Architecture for an artificial immune system. Evolution. Computat. J. 7, 1, 45-68.
-
(1999)
Evolution. Computat. J
, vol.7
, Issue.1
, pp. 45-68
-
-
FORREST, S.1
HOFMEYR, S.2
-
33
-
-
34147153436
-
-
GAHBER, L. 2000. Denial-of-service attacks rip the Internet. IEEE Comput. 33, 4 (Apr.), 12-17.
-
GAHBER, L. 2000. Denial-of-service attacks rip the Internet. IEEE Comput. 33, 4 (Apr.), 12-17.
-
-
-
-
34
-
-
84883679367
-
ISP security-real world techniques
-
online to
-
GEMBERLING, B., MORROW, C., AND GREENE, B. 2001. ISP security-real world techniques. Presentation, NANOG. Go online to www.nanog.org
-
(2001)
Presentation, NANOG. Go
-
-
GEMBERLING, B.1
MORROW, C.2
GREENE, B.3
-
35
-
-
0034229418
-
-
GENG, X. AND WHINSTON, A. 2000. Defeating distributed denial of service attacks. IEEE IT Profess. 2, 4 (Jul./Aug.), 36-41.
-
GENG, X. AND WHINSTON, A. 2000. Defeating distributed denial of service attacks. IEEE IT Profess. 2, 4 (Jul./Aug.), 36-41.
-
-
-
-
38
-
-
0021426851
-
A note on denial-of-service in operating systems
-
GLIGOR, V. D. 1984. A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng. 10, 3, 320-324.
-
(1984)
IEEE Trans. Softw. Eng
, vol.10
, Issue.3
, pp. 320-324
-
-
GLIGOR, V.D.1
-
39
-
-
3242808612
-
-
Available online at
-
GORDON, L. A., LOEB, M. P., LUCYSHYN, W., AND RICHARDSON, R. 2005. 2005 CSI/FBI Computer Crime and Security Survey. Available online at www.GCSI.com.
-
(2005)
2005 CSI/FBI Computer Crime and Security Survey
-
-
GORDON, L.A.1
LOEB, M.P.2
LUCYSHYN, W.3
RICHARDSON, R.4
-
40
-
-
33750311142
-
-
Internet subgroup report. Available online at
-
HANDLEY, M. 2005. Internet Architecture WG: DoS-resistant Internet subgroup report. Available online at http://www.communications.net/ object/download/1543/doc/mjh-dos-summary.pdf.
-
(2005)
Internet Architecture WG: DoS-resistant
-
-
HANDLEY, M.1
-
41
-
-
0014413249
-
The tragedy of the commons
-
HARDIN, G. 1968. The tragedy of the commons. Science, 1243-1248.
-
(1968)
Science
, pp. 1243-1248
-
-
HARDIN, G.1
-
42
-
-
70449669345
-
-
The Honeynet Project & Research Alliance. Feb. Go online to
-
HONEYNET. 2005. Know your enemy:tracking botnets. Whitepaper. The Honeynet Project & Research Alliance. Feb. Go online to www.honaynet.org/index.html.
-
(2005)
Whitepaper, Know your enemy:tracking botnets
-
-
HONEYNET1
-
43
-
-
1242287724
-
-
HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. 2003. A framework for classifying denial of service attacks. In Proceedings of the ACM SIGCOMM Conference (Karlsruhe, Germany). 99-110.
-
HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. 2003. A framework for classifying denial of service attacks. In Proceedings of the ACM SIGCOMM Conference (Karlsruhe, Germany). 99-110.
-
-
-
-
44
-
-
84924375780
-
-
KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), (Boston, MA).
-
KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), (Boston, MA).
-
-
-
-
48
-
-
14944386850
-
On scalable attack detection in the network
-
ACM Press, New York, NY
-
KOMPELLA, R. R., SINGH, S., AND VARGHESE, G. 2004. On scalable attack detection in the network. In IMC '04: Proceedings of the 4th ACM SIGCOMM Conference an Internet Measurement. ACM Press, New York, NY, 187-200.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference an Internet Measurement
, pp. 187-200
-
-
KOMPELLA, R.R.1
SINGH, S.2
VARGHESE, G.3
-
49
-
-
33646927326
-
-
NIST Special Publication 800-58. National Institute of Science and Technology, Gaithersburg, MD
-
KUHN, D., WALSH, T. J., AND FRIES, S. 2005. Security considerations for voice over IP systems. NIST Special Publication 800-58. National Institute of Science and Technology, Gaithersburg, MD.
-
(2005)
Security considerations for voice over IP systems
-
-
KUHN, D.1
WALSH, T.J.2
FRIES, S.3
-
50
-
-
0013347997
-
Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
-
Tech. rep. 2001CRD176. GE Research & Development Center. Schectades, NY
-
KULKARNI, A., BUSH, S., AND EVANS, S. 2001. Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics. Tech. rep. 2001CRD176. GE Research & Development Center. Schectades, NY.
-
(2001)
-
-
KULKARNI, A.1
BUSH, S.2
EVANS, S.3
-
51
-
-
0034497721
-
Distributed denial of service attacks
-
LAU, F., RUBIN, S. H., SMITH, M. H., AND TRAJKOVIĆ, L. 2000. Distributed denial of service attacks. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Vol. 3. 2275-2280.
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics
, vol.3
, pp. 2275-2280
-
-
LAU, F.1
RUBIN, S.H.2
SMITH, M.H.3
TRAJKOVIĆ, L.4
-
52
-
-
0036349004
-
Save: Source address validity enforcement protocol
-
LI, J., MIRKOVIC, J., WANG, M., REITHER, P., AND ZHANG, L. 2002. Save: Source address validity enforcement protocol. In Proceedings of IEEE INFOCOM 2002. 1557-1566.
-
(2002)
Proceedings of IEEE INFOCOM 2002
, pp. 1557-1566
-
-
LI, J.1
MIRKOVIC, J.2
WANG, M.3
REITHER, P.4
ZHANG, L.5
-
53
-
-
34147112403
-
-
LIPSON, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues. Special rep. CMU/SEI-2002-SR-009. CERT Coordination Center. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
LIPSON, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues. Special rep. CMU/SEI-2002-SR-009. CERT Coordination Center. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
-
-
-
54
-
-
4544272175
-
-
MAHAJAN, R., BELLOVIN, S. M., FLOYD, S., IOANNIDIS, J., PAXSON, V., AND SHENKER, S. 2002. Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. 32, 3 (Jul.), 62-73.
-
MAHAJAN, R., BELLOVIN, S. M., FLOYD, S., IOANNIDIS, J., PAXSON, V., AND SHENKER, S. 2002. Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. 32, 3 (Jul.), 62-73.
-
-
-
-
55
-
-
0036804085
-
-
MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag. 40, 10 (Oct.), 76-82.
-
MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag. 40, 10 (Oct.), 76-82.
-
-
-
-
56
-
-
34147125489
-
-
MEASUREMENT. 2005. The measurement factory DNS survey. Go online to http://dns.measurement-factory.com/surveys/sum1.html.
-
MEASUREMENT. 2005. The measurement factory DNS survey. Go online to http://dns.measurement-factory.com/surveys/sum1.html.
-
-
-
-
58
-
-
29244475815
-
-
Prentice Hall, Engle Wood Cliffs, NJ
-
MIHKOVIC, J., DIETRICH, S., DITTRICH, D., AND REIHER, P. 2005. Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, Engle Wood Cliffs, NJ.
-
(2005)
Internet Denial of Service: Attack and Defense Mechanisms
-
-
MIHKOVIC, J.1
DIETRICH, S.2
DITTRICH, D.3
REIHER, P.4
-
59
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France
-
MIRKOVIĆ, J., PRIER, G., AND REIHER, P. 2002. Attacking DDoS at the source. In Proceedings of ICNP 2002 (Paris, France). 312-321.
-
(2002)
Proceedings of ICNP 2002
, pp. 312-321
-
-
MIRKOVIĆ, J.1
PRIER, G.2
REIHER, P.3
-
60
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
MIHKOVIC, J. AND REIHER, P. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34, 2, 39-53.
-
(2004)
ACM SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
MIHKOVIC, J.1
REIHER, P.2
-
61
-
-
17644427757
-
Forming alliance for DDoS defenses
-
ACM Press, New York, NY
-
MIRKOVIC, J., ROBINSON, M., REIHER, P., AND KUENNING, G. 2003. Forming alliance for DDoS defenses. In Proceedings of the New Security Paradigms Workshop (NSPW 2003). ACM Press, New York, NY, 11-18.
-
(2003)
Proceedings of the New Security Paradigms Workshop (NSPW 2003)
, pp. 11-18
-
-
MIRKOVIC, J.1
ROBINSON, M.2
REIHER, P.3
KUENNING, G.4
-
63
-
-
34147171144
-
-
MOCKAPETRIS, P. 1987b. Domain names - implementation and specification. RFC 1035, the Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
MOCKAPETRIS, P. 1987b. Domain names - implementation and specification. RFC 1035, the Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
-
-
-
64
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attacks against web servers
-
CCS, Washington, DC
-
MOHEIN, W. G., STAVROU, A., COOK, D. L., KEHOMYTIS, A. D., MISRA, V., AND RUBENSTEIN, D. 2003. Using graphic turing tests to counter automated ddos attacks against web servers. In Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), (Washington, DC).
-
(2003)
Proceedings of the 10th ACM International Conference on Computer and Communications Security
-
-
MOHEIN, W.G.1
STAVROU, A.2
COOK, D.L.3
KEHOMYTIS, A.D.4
MISRA, V.5
RUBENSTEIN, D.6
-
66
-
-
0028532812
-
Denial of service: An example
-
NEEDHAM, R. M. 1994. Denial of service: an example. Commun. ACM 37, 11, 42-46.
-
(1994)
Commun. ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
NEEDHAM, R.M.1
-
67
-
-
84942417880
-
Cossack: Coordinated suppression of simultaneous attacks
-
PAPADOPOULOS, C., LINDELL, R., MEHRINGER, J., HUSSAIN, A., AND GOVINDAN, R. 2003. Cossack: Coordinated suppression of simultaneous attacks. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX 2003). Vol. 2. 94-96.
-
(2003)
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX 2003)
, vol.2
, pp. 94-96
-
-
PAPADOPOULOS, C.1
LINDELL, R.2
MEHRINGER, J.3
HUSSAIN, A.4
GOVINDAN, R.5
-
68
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
PARK, K. AND LEE, H. 2001a. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of IEEE INFOCOM 2001. 338-347.
-
(2001)
Proceedings of IEEE INFOCOM 2001
, pp. 338-347
-
-
PARK, K.1
LEE, H.2
-
69
-
-
0034776786
-
On the effectiveness of router-based packet filtering for distributed DoS attack prevention in power-law Internets
-
San Diego, California, CA
-
PARK, K. AND LEE, H. 2001b. On the effectiveness of router-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of the 2001 ACM SIGCOMM Conference (San Diego, California, CA). 15-26.
-
(2001)
Proceedings of the 2001 ACM SIGCOMM Conference
, pp. 15-26
-
-
PARK, K.1
LEE, H.2
-
70
-
-
0003375670
-
-
PAXSON, V. 2001. An analysis of using reflectors for distributed denial-of-service attacks. ACM Comput. Commun. Rev. 31, 3 (Jul.), 38-47.
-
PAXSON, V. 2001. An analysis of using reflectors for distributed denial-of-service attacks. ACM Comput. Commun. Rev. 31, 3 (Jul.), 38-47.
-
-
-
-
72
-
-
84948180829
-
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002a. Adjusted probabilistic packet marking for IP traceback. In Proceedings of the Second IFIP Networking Conference (Networking 2002). (Pisa, Italy). 697-708.
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002a. Adjusted probabilistic packet marking for IP traceback. In Proceedings of the Second IFIP Networking Conference (Networking 2002). (Pisa, Italy). 697-708.
-
-
-
-
73
-
-
0141760371
-
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002b. Defending against distributed denial of service attack using selective pushback. In Proceedings of the 9th IEEE International Conference on Telecommunications (IGT 2002) (Bering, China). 411-429.
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002b. Defending against distributed denial of service attack using selective pushback. In Proceedings of the 9th IEEE International Conference on Telecommunications (IGT 2002) (Bering, China). 411-429.
-
-
-
-
74
-
-
0038729330
-
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2003. Prevention from distributed denial of service attacks using history-based IP filtering. In Proceeding of the 38th IEEE International Conference on Communications (ICC 2003) (Anchorage, Alaska). 482-486.
-
PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2003. Prevention from distributed denial of service attacks using history-based IP filtering. In Proceeding of the 38th IEEE International Conference on Communications (ICC 2003) (Anchorage, Alaska). 482-486.
-
-
-
-
76
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
ROCHLIS, J. A. AND EICHIN, M. W. 1989. With microscope and tweezers: The worm from MIT's perspective. Commun. ACM 32, 6, 689-698.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
ROCHLIS, J.A.1
EICHIN, M.W.2
-
77
-
-
0037984544
-
-
online to
-
ROSENBERG, J., SCHULZRINNE, H., CAMARILLO, G., JOHNSTON, A., PETERSON, J., SPARKS, R., HANDLEY, M., AND SCHOOLER, E. 2002. SIP: Session initiation protocol. RFC 3261. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
(2002)
SIP: Session initiation protocol. RFC 3261. Internet Engineering Task Force (IETF). Go
-
-
ROSENBERG, J.1
SCHULZRINNE, H.2
CAMARILLO, G.3
JOHNSTON, A.4
PETERSON, J.5
SPARKS, R.6
HANDLEY, M.7
SCHOOLER, E.8
-
78
-
-
0033650584
-
Practical network support for IP traceback
-
SAVAGE, S., WETHERALL, D., KARLIN, A., AND ANDERSON, T. 2000. Practical network support for IP traceback. In Proceedings of the 2000 ACM SIGCOMM Conference. 295-306.
-
(2000)
Proceedings of the 2000 ACM SIGCOMM Conference
, pp. 295-306
-
-
SAVAGE, S.1
WETHERALL, D.2
KARLIN, A.3
ANDERSON, T.4
-
80
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society, IEEE Computer Society Press, Los Alamitos, CA
-
SCHUBA, C. L., KRSUL, I. V., KUHN, M. G., SPAFFORD, E. H., SUNDARAM, A., AND ZAMBONI, D. 1997. Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society, IEEE Computer Society Press, Los Alamitos, CA, 208-223.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
SCHUBA, C.L.1
KRSUL, I.V.2
KUHN, M.G.3
SPAFFORD, E.H.4
SUNDARAM, A.5
ZAMBONI, D.6
-
81
-
-
34147137250
-
Towards a secure and reliable VoIP infrastructure. Tech. rep
-
May
-
SISALEM, D., EHLERT, S., GENEIATAKIS, D., KAMBOURAKIS, G., DAGIUKLAS, T., MARKL, J., ROKOS, M., BOTRON, O., RODRIGUEZ, J., AND LIU, J. 2005. Towards a secure and reliable VoIP infrastructure. Tech. rep. D2.1. SNOCER. May.
-
(2005)
SNOCER
-
-
SISALEM, D.1
EHLERT, S.2
GENEIATAKIS, D.3
KAMBOURAKIS, G.4
DAGIUKLAS, T.5
MARKL, J.6
ROKOS, M.7
BOTRON, O.8
RODRIGUEZ, J.9
LIU, J.10
-
82
-
-
0034775309
-
Hash-based IP traceback
-
San Diego, CA
-
SNOEREN, A. C., PARTRIDGE, C., SANCHEZ, L. A., JONES, C. E., TCHAKOUNTIO, F., KENT, S. T., AND STRAYER, W. T. 2001. Hash-based IP traceback. In Proceedings of the 2001 ACM SIGCOMM Conference (San Diego, CA). 3-14.
-
(2001)
Proceedings of the 2001 ACM SIGCOMM Conference
, pp. 3-14
-
-
SNOEREN, A.C.1
PARTRIDGE, C.2
SANCHEZ, L.A.3
JONES, C.E.4
TCHAKOUNTIO, F.5
KENT, S.T.6
STRAYER, W.T.7
-
83
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
SONG, D. X. AND PEHRIG, A. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM 2001. 878-886.
-
(2001)
Proceedings of IEEE INFOCOM 2001
, pp. 878-886
-
-
SONG, D.X.1
PEHRIG, A.2
-
85
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
Denver, CO
-
STONE, R. 1999. Centertrack: An IP overlay network for tracking DoS floods. In Proceedings of the 9th USENIX Security Symposium (Denver, CO).
-
(1999)
Proceedings of the 9th USENIX Security Symposium
-
-
STONE, R.1
-
88
-
-
34147146554
-
-
VAUGHN, R. AND EVRON, G. 2006. DNS amplification attacks. Go online to http://www.isotf.org/news/ DNS-Amplification-Attacks.pdf. VIXIE, P. 1999. Extension mechanisms for DNS (EDNSO). RFC 2671. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
VAUGHN, R. AND EVRON, G. 2006. DNS amplification attacks. Go online to http://www.isotf.org/news/ DNS-Amplification-Attacks.pdf. VIXIE, P. 1999. Extension mechanisms for DNS (EDNSO). RFC 2671. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
-
-
-
-
92
-
-
0040911004
-
A survey of Web caching schemes for the internet
-
WANG, J. 1999. A survey of Web caching schemes for the internet. SIGCOMM Comput. Commun. Rev. 29, 5, 36-46.
-
(1999)
SIGCOMM Comput. Commun. Rev
, vol.29
, Issue.5
, pp. 36-46
-
-
WANG, J.1
-
93
-
-
0742300831
-
CDIS: Towards a computer immune system for detecting network intrusions
-
WILLIAMS, P. D., ANCHOR, K. P., BEBO, J. L., GUNSCH, G. H., AND LAMONT, G. B. 2001. CDIS: Towards a computer immune system for detecting network intrusions. In Proceedings of the International Symposium on Recent Advances in Intrusion Detection. 117-133.
-
(2001)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection
, pp. 117-133
-
-
WILLIAMS, P.D.1
ANCHOR, K.P.2
BEBO, J.L.3
GUNSCH, G.H.4
LAMONT, G.B.5
-
94
-
-
0346879936
-
-
Addison-Wesley, Reading, MA
-
WRIGHT, G. R. AND STEVENS, W. R. 1995. TCP/IP Illustrated, The Implementation. Vol. 2. Addison-Wesley, Reading, MA.
-
(1995)
TCP/IP Illustrated, The Implementation
, vol.2
-
-
WRIGHT, G.R.1
STEVENS, W.R.2
-
95
-
-
0003789627
-
-
IETF Internet Draft. Go online to
-
WU, S. F., ZHANG, L., MASSEY, D., AND MANKIN, A. 2001. Intension-Driven ICMP Trace-Back. IETF Internet Draft. Go online to www.ietf.org.
-
(2001)
Intension-Driven ICMP Trace-Back
-
-
WU, S.F.1
ZHANG, L.2
MASSEY, D.3
MANKIN, A.4
-
96
-
-
0038404196
-
-
YAU, D. K. Y., LUI, J. C. S., AND LIANG, F. 2002. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS) (Miami Beach, FL). 35-44.
-
YAU, D. K. Y., LUI, J. C. S., AND LIANG, F. 2002. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS) (Miami Beach, FL). 35-44.
-
-
-
-
97
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
United States Military Academy, West Point, NY
-
ZHANG, Z., LI, J., MANIKOPOULOS, C., JORGENSON, J., AND UCLES, J. 2001. HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (United States Military Academy, West Point, NY).
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
ZHANG, Z.1
LI, J.2
MANIKOPOULOS, C.3
JORGENSON, J.4
UCLES, J.5
|