-
1
-
-
78650149893
-
Reducing unwanted traffic in a backbone network
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Reducing unwanted traffic in a backbone network," in Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005, pp. 9-15.
-
(2005)
Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)
, pp. 9-15
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
3
-
-
0035703761
-
Controlling high-bandwidth flows at the congested router
-
R. Mahajan, S. Floyd, and D. Wetherall, "Controlling high-bandwidth flows at the congested router," in Proceedings of ACM 9th International Conference on Network Protocols (ICNP), 2001, pp. 192-201.
-
(2001)
Proceedings of ACM 9th International Conference on Network Protocols (ICNP)
, pp. 192-201
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
4
-
-
33745371142
-
Proactively detecting DDoS attack using source ip address monitoring
-
T. Peng, C. Leckie, and R. Kotagiri, "Proactively detecting DDoS attack using source ip address monitoring," in Proceedings of the Third International IFIP-TC6 Networking Conference, 2004, pp. 771-782.
-
(2004)
Proceedings of the Third International IFIP-TC6 Networking Conference
, pp. 771-782
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
5
-
-
0032643869
-
Nomad: Traffic based network monitoring framework for anomaly detection
-
R. R. Talpade, G. Kim, and S. Khurana, "Nomad: traffic based network monitoring framework for anomaly detection," in the Fourth IEEE Symposium on Computers and Communications, 1999, pp. 442-451.
-
(1999)
the Fourth IEEE Symposium on Computers and Communications
, pp. 442-451
-
-
Talpade, R.R.1
Kim, G.2
Khurana, S.3
-
6
-
-
31544436627
-
Denial-of-service attack detection techniques
-
January
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack detection techniques," IEEE Internet Computing, vol. 10, no. 1, January 2006, pp. 82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
7
-
-
38549153429
-
-
VINT Project U. C. Berkeley/LBNL, NS2: network simulator, Available at http://www.isi.edu/nsnam/ns, 2006.
-
VINT Project U. C. Berkeley/LBNL, "NS2: network simulator," Available at http://www.isi.edu/nsnam/ns, 2006.
-
-
-
-
8
-
-
33750798519
-
Baseline profile stability for network anomaly detection
-
Y. Kim, J.-Y. Jo, and K. K. Suh, "Baseline profile stability for network anomaly detection," in Proceedings of the 3rd International Conference On Information Technology: New Generations, 2006, pp. 720-725.
-
(2006)
Proceedings of the 3rd International Conference On Information Technology: New Generations
, pp. 720-725
-
-
Kim, Y.1
Jo, J.-Y.2
Suh, K.K.3
-
9
-
-
0041974541
-
Modeling TTL-based internet caches
-
J. Jung, A. Berger, and H. Balakrishnan, "Modeling TTL-based internet caches," in Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 2003, pp. 417-426.
-
(2003)
Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 417-426
-
-
Jung, J.1
Berger, A.2
Balakrishnan, H.3
-
10
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proceedings of DARPA Information Survivability Conference and Exposition, 2003, pp. 303-314.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
12
-
-
3543088029
-
Detecting network attacks in the internet via statistical network traffic normality prediction
-
J. Jiang and S. Papavassiliou, "Detecting network attacks in the internet via statistical network traffic normality prediction," Journal of Network and System Management, vol. 12, no. 1, 2004, pp. 51-72.
-
(2004)
Journal of Network and System Management
, vol.12
, Issue.1
, pp. 51-72
-
-
Jiang, J.1
Papavassiliou, S.2
-
13
-
-
33744996243
-
Abnormal traffic detection and its implementation
-
February
-
S. Lee, H. Kim, J. Na, and J. Jang, "Abnormal traffic detection and its implementation," Advanced Communication Technology, vol. 1, February 2005, pp. 246-250.
-
(2005)
Advanced Communication Technology
, vol.1
, pp. 246-250
-
-
Lee, S.1
Kim, H.2
Na, J.3
Jang, J.4
-
14
-
-
33745176275
-
Pfed: A prediction-based fair active queue management algorithm
-
W Gao, J. Wang, J. Chen, and S. Chen, "Pfed: a prediction-based fair active queue management algorithm," in Proceedings of the IEEE International, Conference on Parallel Processing (ICPP), 2005, pp. 485-491.
-
(2005)
Proceedings of the IEEE International, Conference on Parallel Processing (ICPP)
, pp. 485-491
-
-
Gao, W.1
Wang, J.2
Chen, J.3
Chen, S.4
-
15
-
-
25844461391
-
Fit: Fast internet traceback
-
A. Yaar, A. Perrig, and D. Song, "Fit: fast internet traceback," in Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2005, pp. 1395-1406.
-
(2005)
Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 1395-1406
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
16
-
-
18744362271
-
-
The Swiss Education and Research Network, Available at, 2002
-
The Swiss Education and Research Network, "Default TTL values in TCP/IP," Available at http://secfr.nerim.net/docs/fingerprint/en/ ttldefault.html, 2002.
-
Default TTL values in TCP/IP
-
-
-
19
-
-
0034842243
-
Internet traffic modeling and predict ion using FARIMA models
-
Y. Shu, L. Wang, and L. Zhang, "Internet traffic modeling and predict ion using FARIMA models," Chinese Journal of Computers, vol. 1, no. 24, 2001, pp. 46-54.
-
(2001)
Chinese Journal of Computers
, vol.1
, Issue.24
, pp. 46-54
-
-
Shu, Y.1
Wang, L.2
Zhang, L.3
-
21
-
-
0038052872
-
Random flow network modeling and simulations for DDoS attack mitigation
-
May
-
J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for DDoS attack mitigation," Communications, vol. 1, May 2003, pp. 487-491.
-
(2003)
Communications
, vol.1
, pp. 487-491
-
-
Kong, J.1
Mirza, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
22
-
-
0033204106
-
On power-law relationships of the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the internet topology," in SIGCOMM, 1999, pp. 251-262.
-
(1999)
SIGCOMM
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
23
-
-
38549173087
-
-
Topology Project University of Michigan, Inet: Internet Topology Generator, Available at topology.eecs.umich.edu/inet/, 2006.
-
Topology Project University of Michigan, "Inet: Internet Topology Generator," Available at topology.eecs.umich.edu/inet/, 2006.
-
-
-
-
24
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic," in Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 30-41.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
25
-
-
0029323403
-
Wide-area traffic: The failure of poisson modeling
-
June
-
V. Paxson and S. Floyd, "Wide-area traffic: the failure of poisson modeling," in IEEE/ACM Transactions on Networking, vol. 3, no. 3, June 1995, pp. 226-244.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
26
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "COSSACK: coordinated suppression of simultaneous attacks," in Proceedings of DARPA Information Survivability Conference and Exposition, 2003, pp. 2-13.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
|