-
1
-
-
84858454189
-
DDoS Mitigation via Regional Cleaning Centers, Sprint ATL, Res
-
Report RR04-ATL-013177, Jan
-
S. Agarwal, T. Dawson, and C. Tryfonas, DDoS Mitigation via Regional Cleaning Centers, Sprint ATL, Res. Report RR04-ATL-013177, Jan. 2004, 〈http://ipmon.sprint.com/publications/uploads/RR04-ATL-013177.pdf〉.
-
(2004)
-
-
Agarwal, S.1
Dawson, T.2
Tryfonas, C.3
-
2
-
-
84858477506
-
-
Akamai Technologies
-
Akamai Technologies, 〈http.7/www.akamai. com〉.
-
-
-
-
4
-
-
18144411533
-
Preventing Internet Denial-of-Service with Capabilities
-
T. Anderson, T. Roscoe, and David Wetherall, "Preventing Internet Denial-of-Service with Capabilities," ACM SIGCOMM Comput. Commun. Rev., 34:1 (2004), 39-44.
-
(2004)
ACM SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.1
, pp. 39-44
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
5
-
-
36549000765
-
-
Arbor Networks, Managed Security Services: DDoS Protection and Mitigation, 〈http://www.arbornetworks.com〉.
-
Arbor Networks, "Managed Security Services: DDoS Protection and Mitigation," 〈http://www.arbornetworks.com〉.
-
-
-
-
6
-
-
85050149881
-
Active Internet Traffic Filtering: Real-Time Response to Denial of Service Attacks
-
Anaheim, CA
-
K. Argyraki and D. R. Cheriton, "Active Internet Traffic Filtering: Real-Time Response to Denial of Service Attacks," Proc. USENIX Annual Tech. Conf. (USENIX '05) (Anaheim, CA, 2005), pp. 135-148.
-
(2005)
Proc. USENIX Annual Tech. Conf. (USENIX '05)
, pp. 135-148
-
-
Argyraki, K.1
Cheriton, D.R.2
-
7
-
-
34250668440
-
Network Capabilities: The Good, the Bad and the Ugly
-
College Park, MD
-
K. Argyraki and D. R. Cheriton, "Network Capabilities: The Good, the Bad and the Ugly," Proc. ACM Hot Topics in Networks, Fourth Workshop (HotNets-IV '05) (College Park, MD, 2005).
-
(2005)
Proc. ACM Hot Topics in Networks, Fourth Workshop (HotNets-IV '05)
-
-
Argyraki, K.1
Cheriton, D.R.2
-
8
-
-
84858462570
-
-
Press Release, Nov. 30
-
Avantgarde, "Automated "Bots" Overtake PCs Without Firewalls Within 4 Minutes," Press Release, Nov. 30, 2004, 〈http://www. avantgarde.com/ttln113004.html〉.
-
(2004)
Automated Bots
-
-
Avantgarde1
-
9
-
-
0003972890
-
-
IETF RFC 3272, May, 〉
-
D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao, "Overview and Principles of Internet Traffic Engineering," IETF RFC 3272, May 2002, 〈http://www.ietf.org/rfc/rfc3272.txt.〉.
-
(2002)
Overview and Principles of Internet Traffic Engineering
-
-
Awduche, D.1
Chiu, A.2
Elwalid, A.3
Widjaja, I.4
Xiao, X.5
-
10
-
-
26844548971
-
-
Honeynet Project and Research Alliance, Mar, 〉
-
P. Bacher, T. Holz, M. Kotter, and G. Wicherski, "Know Your Enemy: Tracking Botnets-Using Honeynets to Learn More About Bots," Honeynet Project and Research Alliance, Mar. 2005, 〈http://honeynet.org/papers/bots/ 〉.
-
(2005)
Know Your Enemy: Tracking Botnets-Using Honeynets to Learn More About Bots
-
-
Bacher, P.1
Holz, T.2
Kotter, M.3
Wicherski, G.4
-
11
-
-
84858479003
-
Microsoft Taps Akamai for DNS Backup System
-
redmondmag.com, Jan. 29
-
S. Bekker, "Microsoft Taps Akamai for DNS Backup System," redmondmag.com, Jan. 29, 2001, 〈http://redmondmag.com/news/article.asp? EditorialsID=368〉.
-
(2001)
-
-
Bekker, S.1
-
12
-
-
36549037216
-
-
S. Berinato, How a Bookmaker and a Whiz Kid Took On an Extortionist-and Won, CSO, Nov. 22, 2003, 〈http://www.csoonline.com/ read/050105/extortion.html〉.
-
S. Berinato, "How a Bookmaker and a Whiz Kid Took On an Extortionist-and Won," CSO, Nov. 22, 2003, 〈http://www.csoonline.com/ read/050105/extortion.html〉.
-
-
-
-
13
-
-
0003621085
-
-
IETF RFC 2309, Apr
-
B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang, "Recommendations on Queue Management and Congestion Avoidance in the Internet," IETF RFC 2309, Apr. 1998, 〈http://www.ietf.org/rfc/rfc2309.txt〉.
-
(1998)
Recommendations on Queue Management and Congestion Avoidance in the Internet
-
-
Braden, B.1
Clark, D.2
Crowcroft, J.3
Davie, B.4
Deering, S.5
Estrin, D.6
Floyd, S.7
Jacobson, V.8
Minshall, G.9
Partridge, C.10
Peterson, L.11
Ramakrishnan, K.12
Shenker, S.13
Wroclawski, J.14
Zhang, L.15
-
14
-
-
34250640971
-
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks
-
New Haven, CT
-
M. Casado, P. Cao, A. Akella, and N. Provos, "Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks," Proc. 14th IEEE Internat. Workshop on Quality of Service (IWQoS '06) (New Haven, CT, 2006), pp.286-287.
-
(2006)
Proc. 14th IEEE Internat. Workshop on Quality of Service (IWQoS '06)
, pp. 286-287
-
-
Casado, M.1
Cao, P.2
Akella, A.3
Provos, N.4
-
15
-
-
84858473798
-
-
CERT®, TCP SYN Flooding and IP Spoofing Attacks, Advisory CA-1996-21, Nov. 29, 2000, 〈http://www.cert.org/advisories/CA-1996-2l. html〉.
-
CERT®, "TCP SYN Flooding and IP Spoofing Attacks," Advisory CA-1996-21, Nov. 29, 2000, 〈http://www.cert.org/advisories/CA-1996-2l. html〉.
-
-
-
-
19
-
-
36549040977
-
-
DoS and DDoS Attacks Information, Who Are the Major Players in the Market for Anti-DoS/Anti-DDoS Equipment? 〈http://www.dos-attacks.com/ html/major_market.htm〉.
-
DoS and DDoS Attacks Information, "Who Are the Major Players in the Market for Anti-DoS/Anti-DDoS Equipment?" 〈http://www.dos-attacks.com/ html/major_market.htm〉.
-
-
-
-
23
-
-
36549078670
-
-
F. C. Freiling, T. Holz, and G. Wicherski, Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks, RWTH Aachen University, TR AIB-2005-07, Apr. 2005, 〈http://sunsite.informatik.rwth-aachen.de/Publications/AIB/2005/2005-07. pdf〉.
-
F. C. Freiling, T. Holz, and G. Wicherski, "Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks," RWTH Aachen University, TR AIB-2005-07, Apr. 2005, 〈http://sunsite.informatik.rwth-aachen.de/Publications/AIB/2005/2005-07. pdf〉.
-
-
-
-
24
-
-
0002000920
-
Denial-of-Service Attacks Rip the Internet
-
L. Garber, "Denial-of-Service Attacks Rip the Internet," IEEE Comput., 33:4 (2000), 12-17.
-
(2000)
IEEE Comput
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
25
-
-
84994527163
-
Using Routing and Tunneling to Combat DoS Attacks
-
sponsored by USENIX Assoc, pp
-
A. Greenhalgh, M. Handley, and F. Huici, "Using Routing and Tunneling to Combat DoS Attacks," Proc. 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05) (Cambridge, MA, 2005), sponsored by USENIX Assoc., pp. 1-7.
-
(2005)
Proc. 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05) (Cambridge, MA
, pp. 1-7
-
-
Greenhalgh, A.1
Handley, M.2
Huici, F.3
-
27
-
-
34147104638
-
-
Morgan Kaufmann, San Francisco
-
M. Hofmann and L. R. Beaumont, "Content Networking: Architecture, Protocols, and Practice," Morgan Kaufmann, San Francisco, 2005.
-
(2005)
Content Networking: Architecture, Protocols, and Practice
-
-
Hofmann, M.1
Beaumont, L.R.2
-
28
-
-
20844452458
-
A Short Visit to the Bot Zoo
-
T. Holz, "A Short Visit to the Bot Zoo," IEEE Security Privacy, 3:3 (2005), 76-79.
-
(2005)
IEEE Security Privacy
, vol.3
, Issue.3
, pp. 76-79
-
-
Holz, T.1
-
29
-
-
36549063488
-
-
Insecure.Org, Ping Of Death, Jan. 1997, 〈http:// insecure.org/sploits/ping-o-death.html〉.
-
Insecure.Org, "Ping Of Death," Jan. 1997, 〈http:// insecure.org/sploits/ping-o-death.html〉.
-
-
-
-
30
-
-
36549002701
-
-
IT-Observer, Ping Of Death Comes to Solaris, Jan. 31, 2007, 〈http://www.it-observer. com/news.php?id=7040〉.
-
IT-Observer, "Ping Of Death Comes to Solaris," Jan. 31, 2007, 〈http://www.it-observer. com/news.php?id=7040〉.
-
-
-
-
31
-
-
85034043506
-
Protecting Web Servers from Distributed Denial of Service Attacks
-
Hong Kong
-
F. Kargl, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," Proc. 10th Internat. World Wide Web Conf. (WWW '01) (Hong Kong, 2001), pp. 514-524.
-
(2001)
Proc. 10th Internat. World Wide Web Conf. (WWW '01)
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
33
-
-
36549064263
-
-
kernelSec, 〈http://www.kernelsec.org/〉.
-
kernelSec, 〈http://www.kernelsec.org/〉.
-
-
-
-
34
-
-
0742269306
-
SOS: An Architecture for Mitigating DDoS Attacks
-
A. D. Keromytis, V. Misra, and D. Rubenstein, "SOS: An Architecture for Mitigating DDoS Attacks," IEEE J. Select. Areas in Commun., 22:1 (2004), 176-188.
-
IEEE J. Select. Areas in Commun., 22:1 (2004), 176-188
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
35
-
-
36549068255
-
-
M. Kotadia, National Australia Bank Hit by DDoS Attack, ZDNet Australia, Oct. 20, 2006, 〈http://www.zdnet.com.au/news/security/soa/ National-Australia-Bank-hit-by-DDoS-attack/0,130061744,339271790,00.htm〉.
-
M. Kotadia, "National Australia Bank Hit by DDoS Attack," ZDNet Australia, Oct. 20, 2006, 〈http://www.zdnet.com.au/news/security/soa/ National-Australia-Bank-hit-by-DDoS-attack/0,130061744,339271790,00.htm〉.
-
-
-
-
36
-
-
84858452371
-
Invasion of the Computer Snatchers
-
washingtonpost.com, Feb. 19
-
B. Krebs, "Invasion of the Computer Snatchers," washingtonpost.com, Feb. 19, 2006, 〈http://www.washingtonpost.com/wp-dyn/ content/article/2006/02/14/AR2006021401342.html〉.
-
(2006)
-
-
Krebs, B.1
-
37
-
-
84858458054
-
Blue Security Kicked While It's Down
-
washingtonpost.com, May 17
-
B. Krebs, "Blue Security Kicked While It's Down," washingtonpost.com, May 17, 2006, 〈http://blog.washingtonpost.com/ securityfix/2006/05/blue_security_surrenders_but_s.html〉.
-
(2006)
-
-
Krebs, B.1
-
38
-
-
33646927326
-
-
National Institute of Standards and Technology, Computer Security Division, NIST SP 800-58, Jan
-
D. R. Kuhn, T. J. Walsh, and S. Fries, "Security Considerations for Voice Over IP Systems," National Institute of Standards and Technology, Computer Security Division, NIST SP 800-58, Jan. 2005, 〈http://csrc.nist. gov〉.
-
(2005)
Security Considerations for Voice Over IP Systems
-
-
Kuhn, D.R.1
Walsh, T.J.2
Fries, S.3
-
39
-
-
84858462481
-
The 12-Minute Windows Heist
-
ZDNet Australia, July 1, 130061744,139200021,00.htm〉
-
R. LeMay, "The 12-Minute Windows Heist," ZDNet Australia, July 1, 2005, 〈http://www.zdnet.com.au/news/security/soa/The-12-minute-Windows- heist/0,130061744,139200021,00.htm〉.
-
(2005)
-
-
LeMay, R.1
-
40
-
-
84869632972
-
Blue Security Folds Under Spammer's Wrath
-
May 17
-
R. Lemos, "Blue Security Folds Under Spammer's Wrath," SecurityFocus, May 17, 2006, 〈http://www.securityfocus.com/news/ 11392〉.
-
(2006)
SecurityFocus
-
-
Lemos, R.1
-
41
-
-
84858471042
-
DDoS Attacks Go Through the Roof
-
Feb. 12
-
J. Leyden, "DDoS Attacks Go Through the Roof," The Register, Feb. 12, 2004, 〈http://www.theregister.co.uk/2004/02/12/ ddos_attacks_go_through/〉.
-
(2004)
The Register
-
-
Leyden, J.1
-
42
-
-
84858471700
-
Spamhaus Repels DDoS Attack
-
Sept. 18, 〉
-
J. Leyden, "Spamhaus Repels DDoS Attack," The Register, Sept. 18, 2006, 〈http://www.theregister.co.uk/2006/09/18/spamhaus_ddos_attack/ 〉.
-
(2006)
The Register
-
-
Leyden, J.1
-
44
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
ACM SIGCOMM Comput, Commun, 3 2002
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," ACM SIGCOMM Comput, Commun. Review, 32:3 (2002), 62-73.
-
Review
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
45
-
-
36549061041
-
-
R. McMillan, Botnet Attack Targets Root Servers, CSO, Feb. 7, 2007, 〈http://www2. csoonline.com/blog_view.html?CID=28654〉.
-
R. McMillan, "Botnet Attack Targets Root Servers," CSO, Feb. 7, 2007, 〈http://www2. csoonline.com/blog_view.html?CID=28654〉.
-
-
-
-
46
-
-
84858476909
-
DDoS Attacks Target Final Fantasy XI
-
Apr. 19
-
R. Miller, "DDoS Attacks Target Final Fantasy XI," Netcraft, Apr. 19, 2005, 〈http://news.netcraft.com/archives/2005/04/19/ ddos_attacks_target_final_fantasy_xi.html〉.
-
(2005)
Netcraft
-
-
Miller, R.1
-
47
-
-
84858458029
-
Payment Gateway StormPay Battling Sustained DDoS Attack
-
Feb. 10
-
R. Miller, "Payment Gateway StormPay Battling Sustained DDoS Attack," Netcraft, Feb. 10, 2006, 〈http://news.netcraft.com/archives/ 2006/02/10/payment_gateway_stormpay_ battling_sustained_ddos_attack.html〉.
-
(2006)
Netcraft
-
-
Miller, R.1
-
48
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
ACM SIGCOMM Comput. Commun, 2 2004
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Comput. Commun. Review, 34:2 (2004), 39-53.
-
Review
, vol.34
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
49
-
-
85084161486
-
Inferring Internet Denial-of-Service Activity
-
Washington D.C
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," Proc. 10th USENIX Security Symposium (USENIX Security '01) (Washington D.C., 2001), pp. 9-22.
-
(2001)
Proc. 10th USENIX Security Symposium (USENIX Security '01)
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
50
-
-
36549034332
-
-
OUT-LAW.COM, UK Bans Denial of Service Attacks, OUT-LAW News, Sept. 11, 2006, 〈http://www.out-law.com/page-7462〉.
-
OUT-LAW.COM, "UK Bans Denial of Service Attacks," OUT-LAW News, Sept. 11, 2006, 〈http://www.out-law.com/page-7462〉.
-
-
-
-
51
-
-
0034776786
-
On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
San Diego, CA
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM Conf. Applications, Technol., Architectures, and Protocols for Comput. Commun. (SIGCOMM '01) (San Diego, CA, 2001), pp. 15-26.
-
(2001)
Proc. ACM SIGCOMM Conf. Applications, Technol., Architectures, and Protocols for Comput. Commun. (SIGCOMM '01)
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
52
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
-
ACM SIGCOMM Comput. Commun, 3 2001
-
V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," ACM SIGCOMM Comput. Commun. Review, 31:3 (2001), 38-47.
-
Review
, vol.31
, pp. 38-47
-
-
Paxson, V.1
-
53
-
-
84976845043
-
End-to-End Arguments in System Design
-
J. H. Saltzer, D. P. Reed, and D. D. Clark, "End-to-End Arguments in System Design," ACM Trans. Comput. Syst., 2:4 (1984), 277-288.
-
(1984)
ACM Trans. Comput. Syst
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
54
-
-
36549021624
-
-
Secure Computing, CipherTrust's Zombie Stats, 〈http://www.ciphertrust.com/resources/statistics/zombie.php〉.
-
Secure Computing, "CipherTrust's Zombie Stats," 〈http://www.ciphertrust.com/resources/statistics/zombie.php〉.
-
-
-
-
56
-
-
18844457631
-
WebSOS: An Overlay-Based System for Protecting Web Servers from Denial of Service Attacks
-
A. Stavrou, D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and D. Rubenstein, "WebSOS: An Overlay-Based System for Protecting Web Servers from Denial of Service Attacks," Comput. Networks, 48:5 (2005), 781-807.
-
(2005)
Comput. Networks
, vol.48
, Issue.5
, pp. 781-807
-
-
Stavrou, A.1
Cook, D.L.2
Morein, W.G.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
57
-
-
84858474227
-
Dutch Say Suspects Hacked 1.5M Computers
-
Oct
-
T. Sterling, "Dutch Say Suspects Hacked 1.5M Computers," USA Today, Oct. 2005, 〈http://www.usatoday.com/tech/news/computersecurity/2005- 10-20-dutch-hack_ x.htm〉.
-
(2005)
USA Today
-
-
Sterling, T.1
-
58
-
-
36549061510
-
Why Premium IP Service Has Not Deployed (and Probably Never Will)
-
May 3
-
B. Teitelbaum and S. Shalunov, "Why Premium IP Service Has Not Deployed (and Probably Never Will)," Internet2 QoS Working Group Informational Doc, May 3, 2002, 〈http://qos. internet2.edu/wg/documents- informational/20020503-premium-problems-non-architectural.html〉.
-
(2002)
Internet2 QoS Working Group Informational Doc
-
-
Teitelbaum, B.1
Shalunov, S.2
-
59
-
-
36549011286
-
-
United States, National Security Agency, Central Security Service (NSA/CSS), Security-Enhanced Linux, 〈http://www.nsa.gov/ selinux/〉.
-
United States, National Security Agency, Central Security Service (NSA/CSS), "Security-Enhanced Linux," 〈http://www.nsa.gov/ selinux/〉.
-
-
-
-
61
-
-
84863168814
-
Empirical Study of Tolerating Denial-of-Service Attacks With a Proxy Network
-
Baltimore
-
J. Wang, X. Liu, and A. A. Chien, "Empirical Study of Tolerating Denial-of-Service Attacks With a Proxy Network," Proc. 14th USENIX Security Symposium (USENIX Security '05) (Baltimore, 2005), pp. 51-64.
-
(2005)
Proc. 14th USENIX Security Symposium (USENIX Security '05)
, pp. 51-64
-
-
Wang, J.1
Liu, X.2
Chien, A.A.3
-
63
-
-
3543097593
-
SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks
-
Oakland, CA
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symposium Security and Privacy (S&P '04) (Oakland, CA, 2004), pp. 130-143.
-
(2004)
Proc. IEEE Symposium Security and Privacy (S&P '04)
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
64
-
-
33750308365
-
A DoS-Limiting Network Architecture
-
Philadelphia, PA
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-Limiting Network Architecture," Proc. ACM SIGCOMM Conf. Applications, Technol., Architectures, and Protocols for Comput. Commun. (SIGCOMM '05) (Philadelphia, PA, 2005), pp. 241-252.
-
(2005)
Proc. ACM SIGCOMM Conf. Applications, Technol., Architectures, and Protocols for Comput. Commun. (SIGCOMM '05)
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
|