-
1
-
-
39749169087
-
-
S.M. Bellovin, ICMP traceback messages, Technical Report March 2000.
-
S.M. Bellovin, ICMP traceback messages, Technical Report March 2000.
-
-
-
-
2
-
-
0035438826
-
What can you do with Traceroute?
-
Branigan S., Burch H., Cheswick B., and Wojcik F. What can you do with Traceroute?. IEEE Internet Comput. 5 5 (2001) 96
-
(2001)
IEEE Internet Comput.
, vol.5
, Issue.5
, pp. 96
-
-
Branigan, S.1
Burch, H.2
Cheswick, B.3
Wojcik, F.4
-
3
-
-
0036804084
-
Defending against flooding-based Distributed Denial-of-Service attacks: a tutorial
-
Chang R.K. Defending against flooding-based Distributed Denial-of-Service attacks: a tutorial. IEEE Commun. Mag. 40 10 (2002) 42-51
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.1
-
4
-
-
0036967463
-
-
C.-M. Cheng, H. Kung, K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM 2002, Taibei, China, vol. 3, 2002, pp. 2143- 2148.
-
C.-M. Cheng, H. Kung, K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM 2002, Taibei, China, vol. 3, 2002, pp. 2143- 2148.
-
-
-
-
6
-
-
39749183486
-
-
P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC2827, 2000 URL: 〈http://www.ietf.org/rfc/rfc2827.txt〉.
-
P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC2827, 2000 URL: 〈http://www.ietf.org/rfc/rfc2827.txt〉.
-
-
-
-
7
-
-
39749083375
-
-
J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium, San Diego, California, The Internet Society, 2002.
-
J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium, San Diego, California, The Internet Society, 2002.
-
-
-
-
8
-
-
17644411571
-
-
C. Jin, H.N. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, New York, 2003, pp. 30-41.
-
C. Jin, H.N. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, New York, 2003, pp. 30-41.
-
-
-
-
9
-
-
0036990601
-
-
M. Kalantari, K. Gallicchio, M. Shayman, Using transient behavior of tcp in mitigation of distributed denial of service attacks, in: Proceedings of the 41st IEEE Conference on Decision and Control 2002, vol. 2, 2002, pp. 1422-1427.
-
M. Kalantari, K. Gallicchio, M. Shayman, Using transient behavior of tcp in mitigation of distributed denial of service attacks, in: Proceedings of the 41st IEEE Conference on Decision and Control 2002, vol. 2, 2002, pp. 1422-1427.
-
-
-
-
11
-
-
39749151694
-
-
J. Lemon, Resisting SYN flood DoS attacks with a SYN cache, in: Proceedings of the BSDCon Conference, 2002, pp. 89-97.
-
J. Lemon, Resisting SYN flood DoS attacks with a SYN cache, in: Proceedings of the BSDCon Conference, 2002, pp. 89-97.
-
-
-
-
12
-
-
84904888755
-
-
J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP2002), Paris, France, IEEE Computer Society, 2002, pp. 312-321.
-
J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP2002), Paris, France, IEEE Computer Society, 2002, pp. 312-321.
-
-
-
-
13
-
-
85084161486
-
-
D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 9-22.
-
D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 9-22.
-
-
-
-
14
-
-
39749169753
-
-
Network simulator NS2 〈http://www.isi.edu/nsnam/ns/〉.
-
Network simulator NS2 〈http://www.isi.edu/nsnam/ns/〉.
-
-
-
-
15
-
-
0035010963
-
-
K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of the IEEE INFOCOM, 2001, pp. 338-347.
-
K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of the IEEE INFOCOM, 2001, pp. 338-347.
-
-
-
-
16
-
-
0031247411
-
End-to-end routing behavior in the Internet
-
Paxson V. End-to-end routing behavior in the Internet. IEEE/ACM Trans. Networking 5 5 (1997) 601-615
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.5
, pp. 601-615
-
-
Paxson, V.1
-
17
-
-
0038729330
-
-
T. Peng, C. Leckie, R. Kotagiri, Protection from distributed denial of service attack using history-based IP filtering, in: Proceedings of the IEEE International Conference on Communications, Anchorage, Alaska, USA, vol. 1, 2003, pp. 482-486.
-
T. Peng, C. Leckie, R. Kotagiri, Protection from distributed denial of service attack using history-based IP filtering, in: Proceedings of the IEEE International Conference on Communications, Anchorage, Alaska, USA, vol. 1, 2003, pp. 482-486.
-
-
-
-
18
-
-
39749147743
-
-
J. Postel, Transmission control protocol: DARPA internet program protocol specification, RFC 793, September 1981.
-
J. Postel, Transmission control protocol: DARPA internet program protocol specification, RFC 793, September 1981.
-
-
-
-
19
-
-
0033650584
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2000, pp. 295-306.
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2000, pp. 295-306.
-
-
-
-
20
-
-
0030715989
-
-
C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service attack on TCP, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 208-223.
-
C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service attack on TCP, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 208-223.
-
-
-
-
21
-
-
0034775309
-
-
A.C. Snoeren, Hash-based IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2001, pp. 3-14.
-
A.C. Snoeren, Hash-based IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2001, pp. 3-14.
-
-
-
-
22
-
-
0034997397
-
-
D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of the IEEE INFOCOM, 2001, pp. 878-886.
-
D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of the IEEE INFOCOM, 2001, pp. 878-886.
-
-
-
-
23
-
-
0142039750
-
IP traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks
-
Sung M., and Xu J. IP traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks. IEEE Trans. Parallel Distrib. Systems 14 9 (2003) 861-872
-
(2003)
IEEE Trans. Parallel Distrib. Systems
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
24
-
-
85178309983
-
-
U. Tupakula, V. Varadharajan, Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture, in: Proceedings of the 11th IEEE International Conference on Networks(ICON2003), 2003, pp. 455-460.
-
U. Tupakula, V. Varadharajan, Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture, in: Proceedings of the 11th IEEE International Conference on Networks(ICON2003), 2003, pp. 455-460.
-
-
-
-
25
-
-
0142039747
-
Transport-aware IP routers: a built-in protection mechanism to counter DDoS attacks
-
Wang H., and Shin K. Transport-aware IP routers: a built-in protection mechanism to counter DDoS attacks. IEEE Trans. Parallel Distrib. Systems 14 (2003) 873-884
-
(2003)
IEEE Trans. Parallel Distrib. Systems
, vol.14
, pp. 873-884
-
-
Wang, H.1
Shin, K.2
-
26
-
-
0036343692
-
-
H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, 2002, pp. 1530-1539.
-
H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, 2002, pp. 1530-1539.
-
-
-
-
27
-
-
3543097593
-
-
A. Yaar, A. Perrig, D. Song, SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 2004, pp. 130-143.
-
A. Yaar, A. Perrig, D. Song, SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 2004, pp. 130-143.
-
-
-
|