-
1
-
-
42549147029
-
-
Arbor Networks, Worldwide ISP security report, Sept. 2005. [Online]. Available: http://www.arbor.net/downloads/Arbor.Worldwide. ISP.Security.Report.pdf
-
Arbor Networks, "Worldwide ISP security report," Sept. 2005. [Online]. Available: http://www.arbor.net/downloads/Arbor.Worldwide. ISP.Security.Report.pdf
-
-
-
-
2
-
-
3543113439
-
A framework for classifying denial of service attacks
-
Karlsruhe, Germany, Aug
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. of the ACM SIGCOMM '03, Karlsruhe, Germany, Aug 2003.
-
(2003)
Proc. of the ACM SIGCOMM '03
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
3
-
-
0035361712
-
Network support for IP traceback
-
June
-
S. Savage, D. Wetherall, A. R. Karlin, and T. Anderson, "Network support for IP traceback," ACM/IEEE Transactions on Networking, vol. 9, no. 3, pp. 226-237, June 2001.
-
(2001)
ACM/IEEE Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.4
-
4
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
April
-
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. of the IEEE INFOCOM '01, vol. 2, April 2001, pp. 878-886.
-
(2001)
Proc. of the IEEE INFOCOM '01
, vol.2
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
5
-
-
0036947597
-
Single-packet IP traceback
-
December
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-packet IP traceback," IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721-734, December 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
6
-
-
3543126644
-
Large-scale IP traceback in high-speed internet: Practical techniques and theoretical foundation
-
May
-
J. Li, M. Sung, J. Xu, and L. Li, "Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation," in Proc. of the 2004 IEEE Symp. on Security and Privacy, May 2004, pp. 115-129.
-
(2004)
Proc. of the 2004 IEEE Symp. on Security and Privacy
, pp. 115-129
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
-
7
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
April
-
K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," in Proc. of the IEEE INFOCOM '01, vol. 1, April 2001, pp. 338-347.
-
(2001)
Proc. of the IEEE INFOCOM '01
, vol.1
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
8
-
-
84904888755
-
Attacking DDoS at the source
-
Nov
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. of 10th IEEE International Conference on Network Protocols, Nov 2002, pp. 312-321.
-
(2002)
Proc. of 10th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
9
-
-
33744945767
-
SOS: Secure overlay services
-
Pittsburgh, Pennsylvania, USA, Aug
-
A. D. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure overlay services," in Proc. of the ACM SIGCOMM '02, Pittsburgh, Pennsylvania, USA, Aug 2002, pp. 61-72.
-
(2002)
Proc. of the ACM SIGCOMM '02
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
10
-
-
84904907549
-
IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
-
Nov
-
M. Sung and J. Xu, "IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks," in Proc. of 10th IEEE International Conference on Network Protocols, Nov 2002, pp. 302-311.
-
(2002)
Proc. of 10th IEEE International Conference on Network Protocols
, pp. 302-311
-
-
Sung, M.1
Xu, J.2
-
12
-
-
34250620174
-
NetBouncer: Client-legitimacy-based high-performance DDoS filtering
-
April
-
R. Thomas, B. Mark, T. Johnson, and J. Croall, "NetBouncer: Client-legitimacy-based high-performance DDoS filtering," in Proc. of the DARPA Information Survivability Conference and Exposition, vol. 1, April 2003, pp. 14-25.
-
(2003)
Proc. of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
13
-
-
30944455279
-
Protect e-commerce against DDoS attacks with improved D-WARD detection system
-
March
-
J. Kang, Z. Zhang, and J. bin Ju, "Protect e-commerce against DDoS attacks with improved D-WARD detection system," in Proc. of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, March 2005, pp. 100-105.
-
(2005)
Proc. of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service
, pp. 100-105
-
-
Kang, J.1
Zhang, Z.2
bin Ju, J.3
-
14
-
-
0003552333
-
Controlling high bandwidth aggregates in the network,
-
Technical Report, AT&T Center for Internet Research at ICSI, July
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," Technical Report, AT&T Center for Internet Research at ICSI, July 2001.
-
(2001)
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
15
-
-
0038404196
-
-
D. K. Y. Yau, J. C. S. Lui, and F. Liang, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, in Proc. of the IEEE International Workshop on Quality of Service, May 2002, pp. 35-44.
-
D. K. Y. Yau, J. C. S. Lui, and F. Liang, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," in Proc. of the IEEE International Workshop on Quality of Service, May 2002, pp. 35-44.
-
-
-
-
16
-
-
33745278421
-
-
K. K. K. Wan and R. K. C. Chang, Engineering of a global defense infrastructure for DDoS attacks, in Proc. of the IEEE International Conference on Networks, Aug 2002, pp. 419-427.
-
K. K. K. Wan and R. K. C. Chang, "Engineering of a global defense infrastructure for DDoS attacks," in Proc. of the IEEE International Conference on Networks, Aug 2002, pp. 419-427.
-
-
-
-
17
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
April
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, "COSSACK: Coordinated suppression of simultaneous attacks," in Proc. of the DARPA Information Survivability Conference and Exposition, vol. 1, April 2003, pp. 2-13.
-
(2003)
Proc. of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
18
-
-
17644427757
-
Alliance formation for DDoS defense
-
New York, NY, USA: ACM Press
-
J. Mirkovic, M. Robinson, and P. Reiher, "Alliance formation for DDoS defense," in NSPW '03: Proc. of the 2003 workshop on New security paradigms. New York, NY, USA: ACM Press, 2003, pp. 11-18.
-
(2003)
NSPW '03: Proc. of the 2003 workshop on New security paradigms
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
19
-
-
17744379157
-
Defending against low-rate TCP attacks: Dynamic detection and protection
-
Oct
-
H. Sun, J. C. Lui, and D. K. Yau, "Defending against low-rate TCP attacks: dynamic detection and protection," in Proc. of the 12th IEEE International Conference on Network Protocols, Oct 2004, pp. 196-205.
-
(2004)
Proc. of the 12th IEEE International Conference on Network Protocols
, pp. 196-205
-
-
Sun, H.1
Lui, J.C.2
Yau, D.K.3
-
20
-
-
0000178416
-
Modeling internet topology
-
June
-
K. Calvert, M. Doar, and E. W. Zegura, "Modeling internet topology," IEEE Communications Magazine, vol. 35, pp. 160-163, June 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, pp. 160-163
-
-
Calvert, K.1
Doar, M.2
Zegura, E.W.3
-
21
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
22
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
August
-
T. Gil and M. Poleto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. of the 10th Usenix Security Symposium, August 2001, pp. 23-28.
-
(2001)
Proc. of the 10th Usenix Security Symposium
, pp. 23-28
-
-
Gil, T.1
Poleto, M.2
-
23
-
-
1642535783
-
A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods
-
West Point, NY, June
-
R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods," in Proc. of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, NY, June 2001.
-
(2001)
Proc. of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
25
-
-
42549090139
-
-
H. Lam, C. Li, S. Chanson, and D. Yeung, A coordinated detection and response scheme for distributed denial-of-service attacks, Department of Computer Science, Hong Kong University of Science and Technology, Tech. Rep. Technical Report HKUST-CS06-01, March 2006, ftp://ftp.es.ust.hk/pub/techreport/ 06/tr06-01.pdf.
-
H. Lam, C. Li, S. Chanson, and D. Yeung, "A coordinated detection and response scheme for distributed denial-of-service attacks," Department of Computer Science, Hong Kong University of Science and Technology, Tech. Rep. Technical Report HKUST-CS06-01, March 2006, ftp://ftp.es.ust.hk/pub/techreport/ 06/tr06-01.pdf.
-
-
-
-
26
-
-
0036375286
-
SYN-dog: Sniffing SYN flooding sources
-
Vienna, Austria, July
-
H. Wang, D. Zhang, and K. G. Shin, "SYN-dog: Sniffing SYN flooding sources," in Proc. of the IEEE International Conference on Distributed Computing Systems' 2002, Vienna, Austria, July 2002, pp. 421-428.
-
(2002)
Proc. of the IEEE International Conference on Distributed Computing Systems' 2002
, pp. 421-428
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
27
-
-
42549118554
-
-
L. N. R. Group. (1997, Sept.) UCB/LBNL/VINT network simulator-ns (version 2). [Online]. Available: http://www-mash.cs.berkeley.edu/ns/
-
L. N. R. Group. (1997, Sept.) UCB/LBNL/VINT network simulator-ns (version 2). [Online]. Available: http://www-mash.cs.berkeley.edu/ns/
-
-
-
-
28
-
-
42549145474
-
-
MAWI working group traffic archive. [Online]. Available: http: //tracer.csl.sony.co.jp/mawi
-
MAWI working group traffic archive. [Online]. Available: http: //tracer.csl.sony.co.jp/mawi
-
-
-
|