-
2
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
March
-
T. Benzel, B. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experience with DETER: A testbed for security research. In Proceedings of TRIDENTCOM, March 2006.
-
(2006)
Proceedings of TRIDENTCOM
-
-
Benzel, T.1
Braden, B.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
3
-
-
17644412520
-
Programming routers to improve network security
-
September
-
R. Canonico, D. Cotroneo, L. Peluso, S. P. Romano, and G. Ventre. Programming routers to improve network security. In OPENSIG 2001 Workshop Next Generation Network Programming, September 2001.
-
(2001)
OPENSIG 2001 Workshop Next Generation Network Programming
-
-
Canonico, R.1
Cotroneo, D.2
Peluso, L.3
Romano, S.P.4
Ventre, G.5
-
9
-
-
17644427757
-
Alliance formation for DDoS defense
-
New York, NY, USA, ACM Press
-
J. Mirkovic, M. Robinson, and P. Reiher. Alliance formation for DDoS defense. In Proceedings of the New Security Paradigms Workshop, pages 11-18, New York, NY, USA, 2003. ACM Press.
-
(2003)
Proceedings of the New Security Paradigms Workshop
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
10
-
-
84942253601
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In Proceedings of DISCEX, pages 213, 2003.
-
(2003)
Proceedings of DISCEX
, pp. 213
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
11
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proceedings of the ACM SIGCOMM, pages 295-306, 2000.
-
(2000)
Proceedings of the ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
12
-
-
39049163945
-
D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach
-
S. Shin, K. Kim, and J. Jang. D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical Approach. In SAINT Symposium, pages 430-436, 2005.
-
(2005)
SAINT Symposium
, pp. 430-436
-
-
Shin, S.1
Kim, K.2
Jang, J.3
-
14
-
-
21244446746
-
Perimeter-Based Defense against High Bandwidth DDoS Attacks
-
Q. Song. Perimeter-Based Defense against High Bandwidth DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems, 16(6):526-537, 2005.
-
(2005)
IEEE Transactions on Parallel and Distributed Systems
, vol.16
, Issue.6
, pp. 526-537
-
-
Song, Q.1
-
15
-
-
0037295811
-
Core-stateless fair queueing: A scalable architecture to approximate fair bandwidth allocations in high-speed networks
-
I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks. IEEE/ACM Transactions on Networking, 11(1 ):33-46, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.1
, pp. 33-46
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
-
16
-
-
0142039747
-
Transport-aware ip routers: A built-in protection mechanism to counter ddos attacks
-
H. Wang and K. G. Shin. Transport-aware ip routers: A built-in protection mechanism to counter ddos attacks. IEEE Transactions on Parallel and Distributed Systems, 14(9):873-884, 2003.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 873-884
-
-
Wang, H.1
Shin, K.G.2
-
17
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proceedings of the Operating System Design and Implementation, pages 255-270, 2002.
-
(2002)
Proceedings of the Operating System Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
19
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking, 13(1):29-42, 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
|