-
2
-
-
34250696306
-
-
X. Yang and D. Wetherall and T. Anderson. A DoS-limiting network architecture. In Proc. ACM SIGCOMM, 2005.
-
X. Yang and D. Wetherall and T. Anderson. A DoS-limiting network architecture. In Proc. ACM SIGCOMM, 2005.
-
-
-
-
3
-
-
34250742915
-
-
D. Dittrich. http://staff.washington.edu/dittrich/misc/ddos/.
-
-
-
Dittrich, D.1
-
6
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In Proc. ACM SIGCOMM, 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
9
-
-
1642535783
-
A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods
-
June
-
R. Blazek, H. Kirn, B. Rozovskii, and A. Tartakovsky. A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods. In Proc. IEEE Workshop Information Assurance and Security, June 2001.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
-
-
Blazek, R.1
Kirn, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
10
-
-
34250725228
-
On-line detection of distributed attacks from space-time network flow patterns
-
J. Baras, A. Cardenas, and V. Ramezani. On-line detection of distributed attacks from space-time network flow patterns. In Proc. 23rd Army Science Conf., 2002.
-
(2002)
Proc. 23rd Army Science Conf
-
-
Baras, J.1
Cardenas, A.2
Ramezani, V.3
-
12
-
-
0141464248
-
Hide: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
IEEE
-
Z. Zhang, J. Li, C. Manikopoulos, J. Jorgenson, and J. Ucles. Hide: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proc. of IEEE Man Systems and Cybernetics Information Assurance Workshop. IEEE, 2001.
-
(2001)
Proc. of IEEE Man Systems and Cybernetics Information Assurance Workshop
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.3
Jorgenson, J.4
Ucles, J.5
-
14
-
-
33745278421
-
Engineering of a global defense infrastructure for DDoS attacks
-
Aug
-
K. Wan and R. Chang. Engineering of a global defense infrastructure for DDoS attacks. In Proc. of IEEE Intl. Conf. Networks, pages 419-127, Aug. 2002.
-
(2002)
Proc. of IEEE Intl. Conf. Networks
, pp. 419-127
-
-
Wan, K.1
Chang, R.2
-
15
-
-
0037860750
-
Detecting denial of service attacks using support vector machines
-
S. Mukkamala and A. Sung. Detecting denial of service attacks using support vector machines. In Proc. of IEEE Intl. Conf. Fuzzy Systems, volume 2, pages 1231-1236, 2003.
-
(2003)
Proc. of IEEE Intl. Conf. Fuzzy Systems
, vol.2
, pp. 1231-1236
-
-
Mukkamala, S.1
Sung, A.2
-
16
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
Oct
-
C. Manikopoulos and S. Papavassiliou. Network intrusion and fault detection: a statistical anomaly approach. IEEE Communications Magazine, 40(10):76-82, Oct. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
18
-
-
34250726367
-
-
A. Hussain and J. Heidemann and C. Papadopoulos. A framework for classifying denial of service attacks. In Proc. ACM SIGCOMM, 2003.
-
A. Hussain and J. Heidemann and C. Papadopoulos. A framework for classifying denial of service attacks. In Proc. ACM SIGCOMM, 2003.
-
-
-
-
19
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks (the shrew vs. the mice and elephants)
-
Aug
-
A. Kuzmanovic and E. Knightly. Low-rate TCP-targeted denial of service attacks (the shrew vs. the mice and elephants). In Proc. ACM SIGCOMM, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.2
-
20
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on Internet resources
-
M. Guirguis, A. Bestavros, and I. Matta. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In Proc. IEEE ICNP, 2004.
-
(2004)
Proc. IEEE ICNP
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
22
-
-
25844492549
-
On the effectiveness of DDoS attacks on statistical filtering
-
Q. Li, E. Chang, and M. Chan. On the effectiveness of DDoS attacks on statistical filtering. In Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Li, Q.1
Chang, E.2
Chan, M.3
-
23
-
-
0003973018
-
Computing TCP's retransmission timer. RFC 2988
-
Nov
-
V. Paxson and M. Allman. Computing TCP's retransmission timer. RFC 2988, Nov. 2000.
-
(2000)
-
-
Paxson, V.1
Allman, M.2
-
24
-
-
33751433491
-
Defending against low-rate TCP attack: Dynamic detection and protection
-
H. Sun, J. Lui, and D. Yau. Defending against low-rate TCP attack: Dynamic detection and protection. In Proc. IEEE ICNP, 2004.
-
(2004)
Proc. IEEE ICNP
-
-
Sun, H.1
Lui, J.2
Yau, D.3
-
25
-
-
33847113121
-
Collaborative defense against periodic Shrew DDoS attacks in frequency domain
-
Technical Report TR 2005-11, USC Internet and Grid Computing Lab, 2005
-
Y. Chen and K. Hwang and Y. Kwok. Collaborative defense against periodic Shrew DDoS attacks in frequency domain. Technical Report TR 2005-11, USC Internet and Grid Computing Lab, 2005.
-
-
-
Chen, Y.1
Hwang, K.2
Kwok, Y.3
-
27
-
-
33646909662
-
Performance analysis of TCP/AQM under denial-of-service attacks
-
X. Luo, R. Chang, and E. Chan. Performance analysis of TCP/AQM under denial-of-service attacks. In Proc. of IEEE Intl. Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2005.
-
(2005)
Proc. of IEEE Intl. Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Luo, X.1
Chang, R.2
Chan, E.3
-
28
-
-
0031175629
-
The macroscopic behavior of the TCP congestion avoidance algorithm
-
Jul
-
M. Mathis, J. Semke, J. Mahdavi, and T. Ott. The macroscopic behavior of the TCP congestion avoidance algorithm. Computer Communication Review, 27(3), Jul. 1997.
-
(1997)
Computer Communication Review
, vol.27
, Issue.3
-
-
Mathis, M.1
Semke, J.2
Mahdavi, J.3
Ott, T.4
-
30
-
-
0034513474
-
General AIMD congestion control
-
Y. Yang and S. Lam. General AIMD congestion control. In Proc. IEEE ICNP, 2000.
-
(2000)
Proc. IEEE ICNP
-
-
Yang, Y.1
Lam, S.2
-
41
-
-
0038514762
-
Discrete wavelet transform: Architectures, design and performance issues
-
M. Weeks and M. Bayoumi. Discrete wavelet transform: Architectures, design and performance issues. Journal of VLSI Signal Processing, 35, 2003.
-
(2003)
Journal of VLSI Signal Processing
, vol.35
-
-
Weeks, M.1
Bayoumi, M.2
-
44
-
-
0003833285
-
-
Society for Industrial and Applied Mathematics, Philadelphia, PA, USA
-
I. Daubechies. Ten lectures on wavelets. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 1992.
-
(1992)
Ten lectures on wavelets
-
-
Daubechies, I.1
|