-
2
-
-
0036804084
-
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
-
Oct
-
R.K.C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Comm. Magazine, vol. 40, no. 10, pp. 42-51, Oct. 2002.
-
(2002)
IEEE Comm. Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
5
-
-
33748357746
-
Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources
-
Oct
-
R. Chen and J.-M. Park, "Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources," Proc. IEEE Int'l Conf. Computer Comm. and Networks (ICCCN), pp. 275-280, Oct. 2005.
-
(2005)
Proc. IEEE Int'l Conf. Computer Comm. and Networks (ICCCN)
, pp. 275-280
-
-
Chen, R.1
Park, J.-M.2
-
6
-
-
21244446746
-
Perimeter-Based Defense against High Bandwidth DDoS Attacks
-
June
-
S. Chen and Q. Song, "Perimeter-Based Defense against High Bandwidth DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 6, pp. 526-537, June 2005.
-
(2005)
IEEE Trans. Parallel and Distributed Systems
, vol.16
, Issue.6
, pp. 526-537
-
-
Chen, S.1
Song, Q.2
-
7
-
-
85025403958
-
An Algebraic Approach to IP Traceback
-
May
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," ACM Trans. Information and System Security (TISSEC), vol. 5, no. 2, pp. 119-137, May 2002.
-
(2002)
ACM Trans. Information and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
8
-
-
1242321281
-
DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art
-
Apr
-
C. Douligeris and A. Mitrokotsa, "DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art," Computer Networks, vol. 44, no. 5, pp. 643-666, Apr. 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
9
-
-
25644445353
-
Design and Implementation of Network Puzzles
-
Mar
-
W. Feng, E. Kaiser, and A. Luu, "Design and Implementation of Network Puzzles," Proc. IEEE INFOCOM, pp. 2372-2382, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Luu, A.3
-
10
-
-
0003339187
-
-
A. Fei, G. Pei, R. Liu, and L. Zhang, "Measurements on Delay and Hop-Count of the Internet," http://irl.cs.ucla.edu/papers/ internet-measurement.ps.gz., 2005.
-
(2005)
Measurements on Delay and Hop-Count of the Internet
-
-
Fei, A.1
Pei, G.2
Liu, R.3
Zhang, L.4
-
12
-
-
3543119176
-
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
-
Apr
-
V.D. Gligor, "Guaranteeing Access in Spite of Distributed Service-Flooding Attacks," Proc. Security Protocols Workshop, pp. 66-74, Apr. 2003.
-
(2003)
Proc. Security Protocols Workshop
, pp. 66-74
-
-
Gligor, V.D.1
-
13
-
-
17644411571
-
Hop-Count Filtering: An Effective Defense against Spoofed DoS Traffic
-
Oct
-
C. Jin, H. Wang, and K.G. Shin, "Hop-Count Filtering: An Effective Defense against Spoofed DoS Traffic," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 30-41, Oct. 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
14
-
-
84861587712
-
Client Puzzle: A Cryptographic Defense against Connection Depletion Attacks
-
Feb
-
A. Juels and J. Brainard, "Client Puzzle: A Cryptographic Defense against Connection Depletion Attacks," Proc. Network and Distributed System Security Symp., pp. 151-165, Feb. 1999.
-
(1999)
Proc. Network and Distributed System Security Symp
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
17
-
-
25844469597
-
You Can Run, but You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
-
Sept
-
T.K.T. Law, J.C.S. Lui, and D.K.Y. Yau, "You Can Run, but You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 9, pp. 799-813, Sept. 2005.
-
(2005)
IEEE Trans. Parallel and Distributed Systems
, vol.16
, Issue.9
, pp. 799-813
-
-
Law, T.K.T.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
18
-
-
3543126644
-
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
-
May
-
J. Li, M. Sung, J. Xu, and L. Li, "Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation," Proc. IEEE Symp. Security and Privacy, pp. 115-129, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 115-129
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
20
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
July
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Computer Comm. Rev., vol. 32, no. 3, pp. 62-73, July 2002.
-
(2002)
Computer Comm. Rev
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
21
-
-
34547236975
-
Chained Puzzles: A Novel Framework for IP-Layer Client Puzzles
-
June
-
T. McNevin, J.-M. Park, and R. Marchany, "Chained Puzzles: A Novel Framework for IP-Layer Client Puzzles," Proc. IEEE Int'l Conf. Wireless Networks, Comm., and Mobile Computing (WirelessCom '05), June 2005.
-
(2005)
Proc. IEEE Int'l Conf. Wireless Networks, Comm., and Mobile Computing (WirelessCom '05)
-
-
McNevin, T.1
Park, J.-M.2
Marchany, R.3
-
22
-
-
84904888755
-
Attacking DDoS at the Source
-
Nov
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source," Proc. IEEE Int'l Conf. Network Protocols (ICNP), pp. 312-321, Nov. 2002.
-
(2002)
Proc. IEEE Int'l Conf. Network Protocols (ICNP)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
23
-
-
17644427757
-
Alliance Formation for DDoS Defense
-
Aug
-
J. Mirkovic, M. Robinson, and P. Reiher, "Alliance Formation for DDoS Defense," Proc. Workshop New Security Paradigms, pp. 11-18, Aug. 2003.
-
(2003)
Proc. Workshop New Security Paradigms
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
24
-
-
11144272176
-
A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
-
Apr
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-54, Apr. 2004.
-
(2004)
ACM SIGCOMM Computer Comm. Rev
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
25
-
-
34247555700
-
Distributed Denial of Service Incident Handling: Real-Time Inter-Network Defense
-
work in progress, Feb
-
K.M. Moriarty, "Distributed Denial of Service Incident Handling: Real-Time Inter-Network Defense," IETF Internet draft, work in progress, Feb. 2004.
-
(2004)
IETF Internet draft
-
-
Moriarty, K.M.1
-
26
-
-
0034776786
-
On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
Aug
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM, pp. 15-26, Aug. 2001.
-
(2001)
Proc. ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
27
-
-
84942253601
-
Cossack: Coordinated Suppression of Simultaneous Attacks
-
Apr
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "Cossack: Coordinated Suppression of Simultaneous Attacks," Proc. DARPA Information Survivability Conf. and Exposition, vol. 1, pp. 2-13, Apr. 2003.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
28
-
-
0033650584
-
Practical Network Support for IP Traceback
-
Aug
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM, pp. 295-306, Aug. 2000.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
29
-
-
34247575982
-
Skitter
-
Cooperative Assoc. for Internet Data Analysis
-
"Skitter," http://www.caida.org/tools/measurement/skitter/ index.xml, Cooperative Assoc. for Internet Data Analysis, 2006.
-
(2006)
-
-
-
30
-
-
0034775309
-
Hash-Based IP Traceback
-
Aug
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer, "Hash-Based IP Traceback," Proc. ACM SIGCOMM, pp. 3-14, Aug. 2001.
-
(2001)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
31
-
-
0034997397
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
Apr
-
D.X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM, pp. 878-886, Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
32
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
July
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. USENIX Security Symp., pp. 199-212, July 2000.
-
(2000)
Proc. USENIX Security Symp
, pp. 199-212
-
-
Stone, R.1
-
33
-
-
0142039750
-
IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks
-
Sept
-
M. Sung and J. Xu, "IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 9, pp. 861-872, Sept. 2003.
-
(2003)
IEEE Trans. Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
34
-
-
34250620174
-
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering
-
Apr
-
R. Thomas, B. Mark, T. Johnson, and J. Croall, "NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering," Proc. DARPA Information Survivability Conf. and Exposition, vol. 1, pp. 14-25, Apr. 2003.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
36
-
-
0142039747
-
Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks
-
Sept
-
H. Wang and K.G. Shin, "Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 9, pp. 873-884, Sept. 2003.
-
(2003)
IEEE Trans. Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 873-884
-
-
Wang, H.1
Shin, K.G.2
-
37
-
-
0037328484
-
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
-
Feb
-
J. Xu and W. Lee, "Sustaining Availability of Web Services under Distributed Denial of Service Attacks," IEEE Trans. Computers, vol. 52, no. 2, pp. 195-208, Feb. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
38
-
-
15544363902
-
Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles
-
Feb
-
D.K.Y. Yau, J.C.S. Lui, F. Liang, and Y. Yam, "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," IEEE/ACM Trans. Networking, pp. 29-42, Feb. 2005.
-
(2005)
IEEE/ACM Trans. Networking
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
39
-
-
0037810705
-
Pi: A Path Identification Mechanism to Defend against DDoS Attacks
-
May
-
A. Yaar, A. Perrig, and D. Song, "Pi: A Path Identification Mechanism to Defend against DDoS Attacks," Proc. IEEE Symp. Security and Privacy, pp. 93-107, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
40
-
-
3543059601
-
StackPi: A New Defensive Mechanism against IP Spoofing and DDoS Attacks
-
Technical Report CMU-CS-02-208, Carnegie Mellon Univ, Feb
-
A. Yaar, A. Perrig, and D. Song, "StackPi: A New Defensive Mechanism against IP Spoofing and DDoS Attacks," Technical Report CMU-CS-02-208, Carnegie Mellon Univ., Feb. 2003.
-
(2003)
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
41
-
-
3543097593
-
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks
-
May
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp. Security and Privacy, pp. 130-143, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
42
-
-
25844461391
-
FIT: Fast Internet Traceback
-
Mar
-
A. Yaar, A. Perrig, and D. Song, "FIT: Fast Internet Traceback," Proc. IEEE INFOCOM, pp. 1395-1406, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
, pp. 1395-1406
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
43
-
-
33750308365
-
A DoS-Limiting Network Architecture
-
Aug
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-Limiting Network Architecture," Proc. ACM SIGCOMM, pp. 241-252, Aug. 2005.
-
(2005)
Proc. ACM SIGCOMM
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
|