-
1
-
-
34247568632
-
-
P. Ferguson, D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing (RFC 2827), Internet Request for Comments (May 2000).
-
-
-
-
2
-
-
34247574930
-
-
Kihong Park, Heejo Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, 2001.
-
-
-
-
3
-
-
34247614236
-
-
Strategies to protect against distributed denial of service (DDoS) attacks, Cisco Systems White Paper. http://www.cisco.com/warp/public/707/newsflash.html (February 2000).
-
-
-
-
4
-
-
85034043506
-
-
F. Kargl, J. Maier, M. Weber, Protecting web servers from distributed denial of service attacks, in: Proceedings of WWW, 2001.
-
-
-
-
5
-
-
34247578343
-
-
D.J. Bernstein, SYN cookies. http://cr.yp.to/syncookies.html (November 2001).
-
-
-
-
6
-
-
34247635874
-
-
Jupiter Media Metrix, US top 50 web and digital media properties. http://www.jmm.com/xp/jmm/press/mediaMetrixTop50.xml (October 2001).
-
-
-
-
7
-
-
77953077374
-
-
J. Jung, B. Krishnamurthy, M. Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites, in: Proceedings of 11th WWW Conference, 2002.
-
-
-
-
8
-
-
34247592152
-
-
V.P. Limin Wang, L. Peterson, The effectiveness of request redirection on CDN robustness, in: Proceedings of USENIX Symposium on Operating Systems Design and Implementation, 2002.
-
-
-
-
9
-
-
1542330203
-
-
B. Krishnamurthy, C. Wills, Y. Zhang, On the use and performance of content distribution networks, in: Proceedings of ACM SIGCOMM Internet Measurement Workshop, 2001.
-
-
-
-
10
-
-
34247583584
-
-
IBM e-Business Hosting. http://www.ibm.com/services/webhosting (July 2002).
-
-
-
-
11
-
-
34247587881
-
-
A. Barbir et al., Known CDN request-routing mechanisms, Internet Draft (draft-ietf-cdi-known-request-routing-00.txt) (February 2002).
-
-
-
-
12
-
-
0035007461
-
-
A. Shaikh, R. Tewari, M. Agrawal, On the effectiveness of DNS-based server selection, in: Proceedings of IEEE INFOCOM, 2001.
-
-
-
-
13
-
-
85084163276
-
-
Z.M. Mao, C.D. Cranor, F. Douglis, M. Rabinovich, O. Spatscheck, J. Wang, A precise and efficient evaluation of the proximity between web clients and their local DNS servers, in: Proceedings of USENIX Annual Technical Conference, 2002.
-
-
-
-
15
-
-
85084161486
-
-
David Moore, Geoffrey M. Voelker, Stefan Savage, Inferring internet denial-of-service attack, in: Proceedings of USENIX Security Symposium, 2001.
-
-
-
-
16
-
-
34247559352
-
-
CERT Coordination Center, Denial of service attacks, CERT Tech Tips. http://www.cert.org/tech_tips/denial_of_service.html (June 2001).
-
-
-
-
17
-
-
34247616503
-
-
Web attacks? the ISPs strike back!, ZDNet News. http://zdnet.com.com/2100-11-518743.html?legacy=zdnn (February 2000).
-
-
-
-
18
-
-
34247589931
-
-
Akamai Technologies. http://www.akamai.com.
-
-
-
-
19
-
-
34247628662
-
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer, Hash-based IP traceback, in: Proceedings of ACM SIGCOMM, 2001.
-
-
-
-
20
-
-
34247598579
-
-
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000.
-
-
-
-
21
-
-
34247630827
-
-
CERT Coordination Center, Code Red worm exploiting buffer overflow in IIS indexing service DLL, CERT Advisory CA-2001-19. http://www.cert.org/advisories/CA-2001-19.html (July 2001).
-
-
-
-
22
-
-
34247575443
-
-
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keyed hash functions for message authentication, in: Proceedings of CRYPTO, 1996.
-
-
-
-
23
-
-
25844461391
-
-
A.P. Abraham Yaar, D. Song, FIT: fast internet traceback, in: Proceedings of IEEE INFOCOM, 2005.
-
-
-
-
24
-
-
0034997397
-
-
D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of IEEE INFOCOM, 2001.
-
-
-
-
25
-
-
34247573669
-
-
Hugo Krawczyk, LFSR-based hashing and authentication, in: Proceedings of CRYPTO, 1994.
-
-
-
-
28
-
-
0004247960
-
-
Pless V., and Huffman W. (Eds), Elsevier, Amsterdam
-
In: Pless V., and Huffman W. (Eds). Handbook of Coding Theory (1998), Elsevier, Amsterdam
-
(1998)
Handbook of Coding Theory
-
-
-
29
-
-
0017926560
-
Bounds for binary codes of length less than 25
-
Best M., Brouwer A., MacWilliams F., Odlyzko A., and Sloane N. Bounds for binary codes of length less than 25. IEEE Transactions on Information Theory 24 (1978) 81-93
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 81-93
-
-
Best, M.1
Brouwer, A.2
MacWilliams, F.3
Odlyzko, A.4
Sloane, N.5
-
30
-
-
85011016678
-
-
H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proceedings of USENIX Systems Administration Conference (LISA), 2000.
-
-
-
-
31
-
-
34247599532
-
-
G. Sager, Security fun with OCxmon and cflowd, Presentation to Internet-2 Measurement Working Group. http://www.caida.org/projects/ngi/content/security/1198/ (November 1998).
-
-
-
-
32
-
-
34247643610
-
-
S.M. Bellovin, M.D. Leech, T. Taylor, Internet draft (draft-ietf-itrace-01.txt) (April 2002).
-
-
-
-
33
-
-
85084163540
-
-
R. Stone, CenterTrack: an IP overlay network for tracking DoS floods, in: Proceedings of USENIX Security Symposium, 2000.
-
-
-
-
34
-
-
34247624300
-
-
CERT Coordination Center, TCP SYN flooding and IP spoofing attacks, CERT Advisory CA-1996-21. http://www.cert.org/advisories/CA-1996-21.html (September 1996).
-
-
-
-
35
-
-
34247640427
-
-
Sun Microsystems Security Bulletin #00136. http://sunsolve.sun.com/security (October 1996).
-
-
-
|