-
1
-
-
4544346801
-
-
February
-
CNN, Immense network assault takes down yahoo, February 2000, http://www.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/index.ht ml.
-
(2000)
Immense Network Assault Takes Down Yahoo
-
-
-
2
-
-
34250211085
-
-
February
-
CNN, Cyber-attacks batter web heavyweights, February 2000, http://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/.
-
(2000)
Cyber-attacks Batter Web Heavyweights
-
-
-
3
-
-
85180777711
-
An algebraic approach to ip traceback
-
San Diego, California, February
-
Drew Dean, Matt Franklin, and Adam Stubblefield, "An algebraic approach to ip traceback," Proc. of Network and Distributed System Security Symposium, NDSS '01, San Diego, California, February 2001.
-
(2001)
Proc. of Network and Distributed System Security Symposium, NDSS '01
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
5
-
-
0001647024
-
Practical network support for IP traceback
-
Stockholm, Sweden, August
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, "Practical network support for IP traceback," Proc. of the 2000 ACM SIGCOMM, Stockholm, Sweden, August 2000.
-
(2000)
Proc. of the 2000 ACM SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
6
-
-
4544388084
-
Effect of malicious traffic on the network
-
San Diego, California, April
-
Kun-chan Lan, Alefiya Hussain, and Debojyoti Dutta, "Effect of Malicious Traffic on the Network," Proc. of PAM 2003, San Diego, California, April 2003.
-
(2003)
Proc. of PAM 2003
-
-
Lan, K.-C.1
Hussain, A.2
Dutta, D.3
-
7
-
-
84959060669
-
The architecture of NG-MON: A passive network monitoring system
-
13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2002), Montreal, Canada, October
-
Se-Hee Han, Myung-Sup Kim, Hong-Taek Ju, and James W. Hong, "The Architecture of NG-MON: A Passive Network Monitoring System," Lecture Notes in Computer Science 2506, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2002), Montreal, Canada, October 2002, pp. 16-27.
-
(2002)
Lecture Notes in Computer Science
, vol.2506
, pp. 16-27
-
-
Han, S.-H.1
Kim, M.-S.2
Ju, H.-T.3
Hong, J.W.4
-
8
-
-
3042680176
-
-
Diploma Thesis, Istitute of Communication Network and Computer Engineering, University of Stuttgart, Germany
-
Siegfried Lifler, "Using Flows for Analysis and Measurement of Internet Traffic," Diploma Thesis, Istitute of Communication Network and Computer Engineering, University of Stuttgart, Germany, 1997.
-
(1997)
Using Flows for Analysis and Measurement of Internet Traffic
-
-
Lifler, S.1
-
9
-
-
24944468007
-
NetFlow services and applications
-
Cisco, White Papers, "NetFlow Services and Applications," http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm.
-
White Papers
-
-
-
11
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Washington D.C, Aug
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," Proc. of USENIX Security Symposium, Washington D.C, Aug 2001.
-
(2001)
Proc. of USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
12
-
-
0013347631
-
-
Ping-of-Death (CVE-1999-0128)
-
Common Vulnerabilities and Exposures (CVE), "Ping-of-Death (CVE-1999-0128),"http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-1999-0128.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
14
-
-
0013347631
-
-
SYN flood (CVE-1999-0116)
-
Common Vulnerabilities and Exposures (CVE), "SYN flood (CVE-1999-0116)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0116.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
15
-
-
0013347631
-
-
Smurf (CVE-1999-0513)
-
Common Vulnerabilities and Exposures (CVE), "Smurf (CVE-1999-0513)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0513.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
16
-
-
0013347631
-
-
UDP packet storm (CVE-1999-0103)
-
Common Vulnerabilities and Exposures (CVE), "UDP packet storm (CVE-1999-0103)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0103.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
17
-
-
0013347631
-
-
Fraggle (CVE-1999-0514)
-
Common Vulnerabilities and Exposures (CVE), "Fraggle (CVE-1999-0514)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0514.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
18
-
-
0013347631
-
-
HTTP request flood (CVE-1999-0867)
-
Common Vulnerabilities and Exposures (CVE), "HTTP request flood (CVE-1999-0867)," http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 1999-0867.
-
Common Vulnerabilities and Exposures (CVE)
-
-
-
20
-
-
1642535783
-
A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods
-
New York, June
-
Rudolf B. Blazek, Hongjoong Kim, Boris Rozovskii, and Alexander Tartakovsky, "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods," Pro. of IEEE Systems, Man and Cybernetics Information Assurance Workshop, New York, June 2001.
-
(2001)
Pro. of IEEE Systems, Man and Cybernetics Information Assurance Workshop
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
21
-
-
0038404196
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Miami Beach, Florida, May
-
David K. Y. Yau, John C. S. Lui, and Feng Lian, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," Proc. of IEEE International Workshop on Quality of Service (IWQoS), Miami Beach, Florida, May 2002.
-
(2002)
Proc. of IEEE International Workshop on Quality of Service (IWQoS)
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Lian, F.3
-
23
-
-
84862428961
-
-
eDonkey, http://www.edonkey2000.com/.
-
-
-
-
25
-
-
84862427479
-
-
Welchia Internet Worm, http://securityresponse.symantec.com/avcenter/ venc/data/w32.welchia.worm.html.
-
Welchia Internet Worm
-
-
|