-
1
-
-
0036804084
-
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
-
R.K.C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communication Magazine, 2002.
-
(2002)
IEEE Communication Magazine
-
-
Chang, R.K.C.1
-
2
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS defense Mechanisms
-
April
-
J. Mirkovic, and P. Reiher, "A Taxonomy of DDoS Attack and DDoS defense Mechanisms," ACM SIGCOMM Computer Communications Review, Volume 34, Number 2, April 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
-
-
Mirkovic, J.1
Reiher, P.2
-
3
-
-
3242808612
-
-
Computer Crime Research Center, Available at
-
Computer Crime Research Center. "2004 CSI/FBI Computer Crime and Security Survey," Available at: http://www.crime-research.org/news/11.06. 2004/423/
-
(2004)
CSI/FBI Computer Crime and Security Survey
-
-
-
6
-
-
1642535783
-
A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods
-
R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods," Proceedings of IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2001.
-
(2001)
Proceedings of IEEE Systems, Man and Cybernetics Information Assurance Workshop
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
7
-
-
33646932291
-
Protection against DDoS Attacks Based on Traffic Level Measurements
-
Boldizsar Bencsath, and Istvan Vajda, "Protection against DDoS Attacks Based on Traffic Level Measurements," Western Simulation MultiConference. San Diego, California, USA., 2004.
-
(2004)
Western Simulation MultiConference. San Diego, California, USA
-
-
Bencsath, B.1
Vajda, I.2
-
8
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
C.M. Cheng, H.T. Kung, and K.S. Tan, "Use of spectral analysis in defense against DoS attacks," Proceedings of IEEE GLOBECOM 2002, pp. 2143-2148, 2002.
-
(2002)
Proceedings of IEEE GLOBECOM 2002
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
9
-
-
84904888755
-
Attacking DDoS at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," Proceedings of ICNP 2002, Paris, France, pp. 312-321, 2002.
-
(2002)
Proceedings of ICNP 2002, Paris, France
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
11
-
-
34548152095
-
-
GT-ITM Traffic Generator Documentation and tool http://www.cc.gatech.edu/ fac/EllenLegura/graphs.html
-
GT-ITM Traffic Generator Documentation and tool http://www.cc.gatech.edu/ fac/EllenLegura/graphs.html
-
-
-
-
12
-
-
84874690676
-
-
Available
-
NS Documentation Available: http://www.isi.edu/ nsnam/ns
-
NS Documentation
-
-
-
13
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, nos. 23-24, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 23-24
-
-
Paxson, V.1
-
15
-
-
34548148265
-
On the Robustness of Router-based Denial-of-Service Defense Systems
-
Y. Xu, and R. Guerin, "On the Robustness of Router-based Denial-of-Service Defense Systems," ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Xu, Y.1
Guerin, R.2
-
16
-
-
34548180399
-
Implementing Pushback: Router-Based Defense Against DDoS Attacks
-
J. Ioannidis, and S. M. Bellovin, "Implementing Pushback: Router-Based Defense Against DDoS Attacks," IEEE INFOCOMM, 2003.
-
(2003)
IEEE INFOCOMM
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
17
-
-
34548190593
-
A Distributed Approach using Entropy to Detect DDoS Attack
-
Technical Report E & CE, TR, 2006, 002, Indian Institute of Technology Roorkee
-
Krishan Kumar, R.C. Joshi, and Kuldip Singh, "A Distributed Approach using Entropy to Detect DDoS Attack", Technical Report E & CE - TR - 2006 - 002, Indian Institute of Technology Roorkee, 2006.
-
(2006)
-
-
Krishan Kumar, R.C.J.1
Singh, K.2
|