-
1
-
-
3042825073
-
IP Traceback: A New Denial-of-Service Deterrent
-
May/June
-
H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent," IEEE Security and Privacy, pp. 24-31, May/June 2003.
-
(2003)
IEEE Security and Privacy
, pp. 24-31
-
-
Aljifri, H.1
-
5
-
-
1642535783
-
A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
June
-
R. Blazek et al., "A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Proc. IEEE Workshop Information Assurance and Security, June 2001.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
-
-
Blazek, R.1
-
6
-
-
33847742744
-
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
-
Apr./June
-
M. Cai, K. Hwang, J. Pan, and C. Papadupolous, "WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, Apr./June 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.2
-
-
Cai, M.1
Hwang, K.2
Pan, J.3
Papadupolous, C.4
-
7
-
-
31544436627
-
Denial-of-Service Attack Detection Techniques
-
Jan./Feb
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service Attack Detection Techniques," IEEE Internet Computing, Jan./Feb. 2006.
-
(2006)
IEEE Internet Computing
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
8
-
-
0036871268
-
Internet Infrastructure Security: A Taxonomy
-
Nov
-
A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," IEEE Network, Nov. 2002.
-
(2002)
IEEE Network
-
-
Chakrabarti, A.1
Manimaran, G.2
-
9
-
-
21244446746
-
Perimeter-Based Defense against High Bandwidth DDoS Attacks
-
June
-
S. Chen and Q. Song, "Perimeter-Based Defense against High Bandwidth DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 6, June 2005.
-
(2005)
IEEE Trans. Parallel and Distributed Systems
, vol.16
, Issue.6
-
-
Chen, S.1
Song, Q.2
-
10
-
-
33746985496
-
Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis
-
Sept
-
Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis," J. Parallel and Distributed Computing, special issue on security in grids and distributed systems, pp. 1137-1151, Sept. 2006.
-
(2006)
J. Parallel and Distributed Computing
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
12
-
-
63049086544
-
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
-
X. Dimitropoulos, D. Krioukov, G. Riley, and K. Claffy, "Revealing the Autonomous System Taxonomy: The Machine Learning Approach," Proc. Passive and Active Measurement Workshop (PAM '06), 2006.
-
(2006)
Proc. Passive and Active Measurement Workshop (PAM '06)
-
-
Dimitropoulos, X.1
Krioukov, D.2
Riley, G.3
Claffy, K.4
-
13
-
-
36349029422
-
-
D. Dittrich, "The "Stacheldraft" Distributed Denial of Service Attack Tool," http://staff.washington.edu/dittrich/, 2000.
-
(2000)
The Stacheldraft
-
-
Dittrich, D.1
-
15
-
-
0003867558
-
-
IETF RFC 1519
-
V. Fuller, T. Li, J. Yu, and K. Varadhan, Classless Inter-Domain Routing (CIDR): An Address Assignment and Aggregation Strategy, IETF RFC 1519, 1993.
-
(1993)
Classless Inter-Domain Routing (CIDR): An Address Assignment and Aggregation Strategy
-
-
Fuller, V.1
Li, T.2
Yu, J.3
Varadhan, K.4
-
16
-
-
85084163167
-
MULTOPS: A Data-Structure for Bandwidth Attack Detection
-
Aug
-
T. Gil and M. Poletto, "MULTOPS: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., Aug. 2001.
-
(2001)
Proc. 10th Usenix Security Symp
-
-
Gil, T.1
Poletto, M.2
-
19
-
-
33847743856
-
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
-
Jan.-Mar
-
K. Hwang, M. Cai, Y. Chen, and M. Qin, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 1, pp. 41-55, Jan.-Mar. 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
21
-
-
36349024975
-
Report, "AS Resource Allocations," http://bgp.potaroo.net/iso3166/ascc.html,
-
ISO 3166
-
ISO 3166 Report, "AS Resource Allocations," http://bgp.potaroo.net/iso3166/ascc.html, 2006.
-
(2006)
-
-
-
22
-
-
33646418320
-
Why Is the Internet Traffic Bursty in Short Time Scales
-
June
-
H. Jiang and C. Dovrolis, "Why Is the Internet Traffic Bursty in Short Time Scales," Proc. ACM SIGMETRICS '05, June 2005.
-
(2005)
Proc. ACM SIGMETRICS '05
-
-
Jiang, H.1
Dovrolis, C.2
-
24
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds
-
May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds," Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05), May 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
26
-
-
8344261545
-
PacketScore: Statistics-Based Overload Control against Distributed Denial of Service Attacks
-
Y. Kim, W.C. Lau, M.C. Chuah, and H.J. Chao, "PacketScore: Statistics-Based Overload Control against Distributed Denial of Service Attacks," Proc. INFOCOM '04, 2004.
-
(2004)
Proc. INFOCOM '04
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
27
-
-
25844469597
-
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
-
Sept
-
T. Law, J. Lui, and D. Yau, "You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers," IEEE Trans. Parallel and Distributed Systems, Sept. 2005.
-
(2005)
IEEE Trans. Parallel and Distributed Systems
-
-
Law, T.1
Lui, J.2
Yau, D.3
-
28
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Computer Comm. Rev., July 2002.
-
(2002)
Computer Comm. Rev
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
32
-
-
84883386223
-
Abstraction-Based Intrusion Detection in Distributed Environment
-
Nov
-
P. Ning, S. Jajodia, and X.S. Wang, "Abstraction-Based Intrusion Detection in Distributed Environment," ACM Trans. Information and System Security, pp. 407-452, Nov. 2001.
-
(2001)
ACM Trans. Information and System Security
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
33
-
-
84942253601
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "COSSACK: Coordinated Suppression of Simultaneous Attacks," Proc. Third DARPA Information Survivability Conf. and Exposition (DISCEX-III '03), pp. 2-13, 2003.
-
(2003)
Proc. Third DARPA Information Survivability Conf. and Exposition (DISCEX-III '03)
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
36
-
-
33845591142
-
DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
-
Apr
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," Proc. INFOCOM '06, Apr. 2006.
-
(2006)
Proc. INFOCOM '06
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
37
-
-
30644473909
-
Adaptive Trust Negotiation and Access Control
-
June
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K.E. Seamons, "Adaptive Trust Negotiation and Access Control," Proc. ACM Symp. Access Control Models and Technologies (SACMAT '05), June 2005.
-
(2005)
Proc. ACM Symp. Access Control Models and Technologies (SACMAT '05)
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
38
-
-
0041915603
-
Power-Laws and the AS-Level Internet Topology
-
Aug
-
G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos, "Power-Laws and the AS-Level Internet Topology," ACM/IEEE Trans. Networking, pp. 514-524, Aug. 2003.
-
(2003)
ACM/IEEE Trans. Networking
, pp. 514-524
-
-
Siganos, G.1
Faloutsos, M.2
Faloutsos, P.3
Faloutsos, C.4
-
41
-
-
36349011617
-
DDoS Defense by Offense
-
Sept
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, "DDoS Defense by Offense," Proc. ACM SIGCOMM '06, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM '06
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
42
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
Oct.-Dec
-
H. Wang, D. Zhang, and K. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable and Secure Computing, vol. 1, Oct.-Dec. 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
43
-
-
33745686749
-
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks
-
July
-
X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 7, July 2006.
-
(2006)
IEEE Trans. Parallel and Distributed Systems
, vol.17
, Issue.7
-
-
Wang, X.1
Chellappan, S.2
Boyer, P.3
Xuan, D.4
|