-
1
-
-
34247604232
-
-
P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC 2827, May 2000.
-
-
-
-
2
-
-
0035361712
-
Network support for IP traceback
-
Savage S., Wetherall D., Karlin A., and Anderson T. Network support for IP traceback. IEEE/ACM Trans. Networking 9 3 (2001) 226-237
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
3
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
ACM Press, New York, NY, USA
-
Park K., and Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Proc. of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August (2001), ACM Press, New York, NY, USA 15-26
-
(2001)
Proc. of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, August
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
4
-
-
34247628162
-
-
C. Morrow, B. Gemberling, How to track a DoS attack (nanog post) [Online]. .
-
-
-
-
5
-
-
85084161486
-
-
D. Moore, G.M. Voelker, S. Savage, Inferring Internet denial of service activity, in: Proc. 10th USENIX Security Symposium, 2001, pp. 9-22.
-
-
-
-
6
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: a tutorial
-
Chang R.K.C. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40 10 (2002) 42-51
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
8
-
-
34247597562
-
-
S.M. Bellovin, ICMP traceback messages, IETF Draft, March 2000.
-
-
-
-
9
-
-
34247574942
-
-
S.F. Wu, L. Zhang, D. Massey, A. Mankin, Intention-driven ICMP trace-back, IETF Draft, February 2001 [Online]. .
-
-
-
-
10
-
-
84950242640
-
-
S.F. Wu, L. Zhang, D. Massey, A. Mankin, On design and evaluation of intention-driven ICMP traceback, in: Proc. 10th Inter. Conf. on Computer Comm. and Networks, October 2001, pp. 159-165.
-
-
-
-
12
-
-
0034997397
-
-
D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proc. INFOCOM 2001, April 2001, vol. 2, pp. 878-886.
-
-
-
-
13
-
-
0034448864
-
Using router stamping to identify the source of IP packets
-
ACM Press, New York, NY, USA
-
Doeppner T.W., Klein P.N., and Koyfman A. Using router stamping to identify the source of IP packets. Proc. of 7th ACM Inter. Conf. on Computer Comm. and Networks, November (2000), ACM Press, New York, NY, USA 184-189
-
(2000)
Proc. of 7th ACM Inter. Conf. on Computer Comm. and Networks, November
, pp. 184-189
-
-
Doeppner, T.W.1
Klein, P.N.2
Koyfman, A.3
-
14
-
-
3142749817
-
Probabilistic packet parking with non-preemptive compensation
-
Tseng Y.K., and Hsieh H.H.C.W.S. Probabilistic packet parking with non-preemptive compensation. IEEE Commun. Lett. 8 6 (2004) 359-361
-
(2004)
IEEE Commun. Lett.
, vol.8
, Issue.6
, pp. 359-361
-
-
Tseng, Y.K.1
Hsieh, H.H.C.W.S.2
-
15
-
-
0037810705
-
-
A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: Proc. 2003 Symposium on Security and Privacy, 2003, May 2003, pp. 93-107.
-
-
-
-
16
-
-
25844461391
-
-
A. Yaar, A. Perrig, D. Song, FIT: fast Internet traceback, in: INFOCOM 2005, March 2005, vol. 2, pp. 1395-1406.
-
-
-
-
17
-
-
0038011192
-
-
M.T. Goodrich, Efficient packet marking for large-scale IP traceback, in: CCS'02: Proc. of the 9th ACM Conf. on Comp. and Comm. Sec., November 2002, pp. 117-126.
-
-
-
-
18
-
-
33751257165
-
A practical and robust inter-domain marking scheme for IP traceback
-
Gao Z., and Ansari N. A practical and robust inter-domain marking scheme for IP traceback. Computer Networks 51 3 (2007) 732-750
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 732-750
-
-
Gao, Z.1
Ansari, N.2
-
19
-
-
0036947597
-
Single-packet IP traceback
-
Snoeren A.C., et al. Single-packet IP traceback. IEEE/ACM Trans. Networking 10 6 (2002) 721-734
-
(2002)
IEEE/ACM Trans. Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
-
20
-
-
0036329754
-
Tracing network attacks to their sources
-
Baba T., and Matsuda S. Tracing network attacks to their sources. IEEE Internet Comput. 6 2 (2002) 20-26
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.2
, pp. 20-26
-
-
Baba, T.1
Matsuda, S.2
-
21
-
-
84893121153
-
-
S. Matsuda, T. Baba, A. Hayakawa, T. Nakamura, Design and implementation of unauthorized access tracing system, in: Proc. of the 2002 Symposium on Applications and the Internet, 2002 (SAINT 2002), January/February 2002, pp. 74-81.
-
-
-
-
22
-
-
3543126644
-
-
J. Li, M. Sung, J. Xu, L. Li, Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation, in: Proc. 2004 IEEE Symposium on Security and Privacy, May 2004, pp. 115-129.
-
-
-
-
23
-
-
85084163540
-
-
R. Stone, Centertrack: an IP overlay network for tracking DoS floods, in: Proc. of 9th USENIX Security Symposium, August 2000.
-
-
-
-
24
-
-
84962214242
-
-
H. Chang et al., Deciduous: decentralized source identification for network-based intrusions, in: Proc. of 6th IFIP/IEEE International Symposium on Integrated Net. Management, May 1999, pp. 701-714.
-
-
-
-
25
-
-
84962278506
-
-
H. Chang et al., Design and implementation of a real-time decentralized source identification system for untrusted ip packets, in: Proc. of the DARPA Information Survivability Conference & Exposition, January 2000, vol. 2, pp. 100-111.
-
-
-
-
26
-
-
85011016678
-
-
H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proc. of 2000 USENIX LISA Conference, December 2000, pp. 319-327.
-
-
-
-
27
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Belenky A., and Ansari N. IP traceback with deterministic packet marking. IEEE Commun. Lett. 7 4 (2003) 162-164
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
28
-
-
34247647755
-
-
A. Belenky, IP Traceback with Deterministic Packet Marking (DPM), Ph.D. dissertation, NJIT, Newark, August 2003.
-
-
-
-
29
-
-
0142199483
-
-
A. Belenky, N. Ansari, Tracing multiple attackers with deterministic packet marking (DPM), in: Proc. of IEEE PacRim, August 2003, vol. 1, pp. 49-52.
-
-
-
-
30
-
-
0036947484
-
Beyond folklore: observations on fragmented traffic
-
Shannon C., Moore D., and Claffy K.C. Beyond folklore: observations on fragmented traffic. IEEE/ACM Trans. Networking 10 6 (2002) 709-720
-
(2002)
IEEE/ACM Trans. Networking
, vol.10
, Issue.6
, pp. 709-720
-
-
Shannon, C.1
Moore, D.2
Claffy, K.C.3
-
31
-
-
34247575955
-
-
J. Mogul, S. Deering, Path MTU discovery, RFC 1191, November 1990.
-
-
-
-
32
-
-
34247561493
-
-
J. Postel, Internet protocol, RFC 791, September 1981.
-
-
-
-
33
-
-
34247622553
-
-
D.D. Clark, IP datagram reassembly algorithms, RFC 815, July 1982.
-
-
-
-
34
-
-
34247619047
-
-
F. Baker, Requirements for IP version 4 routers, RFC 1812, June 1995.
-
-
-
-
36
-
-
34247631377
-
-
R. Braden, Requirements for Internet hosts - communication layers, RFC 1122, October 1989.
-
-
-
-
37
-
-
34247566300
-
-
S. McCreary, C.K. Claffy, Trends in wide area IP traffic patterns, in: ITC Specialist Seminar, CAIDA, 2000.
-
-
-
-
38
-
-
1542360060
-
Pop-level and access-link-level traffic dynamics in a tier-1 POP
-
ACM Press, New York, NY, USA
-
Bhattacharyya S., Diot C., and Jetcheva J. Pop-level and access-link-level traffic dynamics in a tier-1 POP. Proc. of the First ACM SIGCOMM Workshop on Internet Measurement Workshop (2001), ACM Press, New York, NY, USA 39-53
-
(2001)
Proc. of the First ACM SIGCOMM Workshop on Internet Measurement Workshop
, pp. 39-53
-
-
Bhattacharyya, S.1
Diot, C.2
Jetcheva, J.3
-
40
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
Paxson V. An analysis of using reflectors for distributed denial-of-service attacks. Comput. Commun. Rev. 31 3 (2001) 38-47
-
(2001)
Comput. Commun. Rev.
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
41
-
-
34247601267
-
-
IBM TotalStorage Product Guide, IBM Systems Group, October 2006 [Online]. .
-
-
-
|