-
1
-
-
3242808612
-
-
L. A. Gordon, M. P. Loeb, W. Lucyshyn, and R. Richardson, 2005 CSI/FBI Computer Crime and Security Survey, 2006.
-
(2005)
CSI/FBI Computer Crime and Security Survey, 2006
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
2
-
-
85011016678
-
Tracing Anonymous Packets to their Approximate Source
-
New Orleans, Lousiana, USA, Dec
-
H. Burch and B. Cheswick, "Tracing Anonymous Packets to their Approximate Source," in USENIX LISA'00, New Orleans, Lousiana, USA, Dec. 2000, pp. 319-327.
-
(2000)
USENIX LISA'00
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
3
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
Denver, Colorado, USA, Aug
-
R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," in 9th USENIX Security Symposium, Denver, Colorado, USA, Aug. 2000, pp. 199-212.
-
(2000)
9th USENIX Security Symposium
, pp. 199-212
-
-
Stone, R.1
-
4
-
-
47249136790
-
-
InformationWeek.com, Dutch Botnet Bigger Than Expected, Oct. 2005.
-
InformationWeek.com, Dutch Botnet Bigger Than Expected, Oct. 2005.
-
-
-
-
5
-
-
47249152116
-
-
CERT Advisory CA-1996-26 Denial-of-Service Attack via ping, Dec
-
CERT Advisory CA-1996-26 Denial-of-Service Attack via ping, CERT, Dec. 1996.
-
(1996)
CERT
-
-
-
6
-
-
47249119073
-
-
CERT Advisory CA-1997-28 IP Denial-of-Service Attacks, Dec
-
CERT Advisory CA-1997-28 IP Denial-of-Service Attacks, CERT, Dec. 1997.
-
(1997)
CERT
-
-
-
9
-
-
47249111550
-
-
Vulnerability Note VU#222750: TCP/IP Implementations Do Not Adequately Validate ICMP Error Messages, US-CERT, Apr. 2005.
-
Vulnerability Note VU#222750: TCP/IP Implementations Do Not Adequately Validate ICMP Error Messages, US-CERT, Apr. 2005.
-
-
-
-
10
-
-
47249095227
-
-
CERT Incident Note IN-99-07 Distributed Denial-of-Service Tools, Nov
-
CERT Incident Note IN-99-07 Distributed Denial-of-Service Tools, CERT, Nov. 1999.
-
(1999)
CERT
-
-
-
11
-
-
85084161090
-
Detecting Stepping Stones
-
Denver, Colorado, USA, Aug
-
Y. Zhang and V. Paxson, "Detecting Stepping Stones," in Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, Aug. 2000, pp. 171-184.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
-
12
-
-
0035361712
-
Network Support for IP Traceback
-
June
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP Traceback," IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp. 226-237, June 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
13
-
-
85025403958
-
An Algebraic Approach to IP Traceback
-
May
-
D. Dean, M. Franklin, and A. Stubblefleld, "An Algebraic Approach to IP Traceback," ACM Transactions on Information and System Security, vol. 5, no. 2, pp. 119-137, May 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefleld, A.3
-
15
-
-
84950242640
-
On Design and Evaluation of 'Intention-Driven' ICMP Traceback
-
Scottsdale, Arizona, USA, Oct
-
A. Mankin, D. Massey, C.-L. Wu, S. F. Wu, and L. Zhang, "On Design and Evaluation of 'Intention-Driven' ICMP Traceback," in Proceedings of the IEEE ICCCN 2001 Conference, Scottsdale, Arizona, USA, Oct. 2001.
-
(2001)
Proceedings of the IEEE ICCCN 2001 Conference
-
-
Mankin, A.1
Massey, D.2
Wu, C.-L.3
Wu, S.F.4
Zhang, L.5
-
16
-
-
0034997397
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
Anchorage, Alaska, USA, Apr
-
D. X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," in Proceedings of the IEEE INFOCOM 2001 Conference, Anchorage, Alaska, USA, Apr. 2001.
-
(2001)
Proceedings of the IEEE INFOCOM 2001 Conference
-
-
Song, D.X.1
Perrig, A.2
-
17
-
-
0036947597
-
Single-Packet IP Traceback
-
Dec
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-Packet IP Traceback," IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721-734, Dec. 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
18
-
-
33745627104
-
Incremental Service Deployment Using the Hop-By-Hop Multicast Routing Protocol
-
L. H. M. K. Costa, S. Fdida, and O. C. M. B. Duarte, "Incremental Service Deployment Using the Hop-By-Hop Multicast Routing Protocol," IEEE/ACM Transactions on Networking, vol. 14, no. 3, pp. 543-556, 2006.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.3
, pp. 543-556
-
-
Costa, L.H.M.K.1
Fdida, S.2
Duarte, O.C.M.B.3
-
19
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
July
-
B. H. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 7, no. 13, pp. 442-426, July 1970.
-
(1970)
Communications of the ACM
, vol.7
, Issue.13
, pp. 442-426
-
-
Bloom, B.H.1
-
20
-
-
47249091165
-
-
R. P. Laufer, P. B. Velloso, D. de O. Cunha, I. M. Moraes, M. D. D. Bicudo, and O. C. M. B. Duarte, A New IP Traceback System against Denial-of-Service Attacks, in 12th International Conference on Telecommunications, Capetown, South Africa, May 2005.
-
R. P. Laufer, P. B. Velloso, D. de O. Cunha, I. M. Moraes, M. D. D. Bicudo, and O. C. M. B. Duarte, "A New IP Traceback System against Denial-of-Service Attacks," in 12th International Conference on Telecommunications, Capetown, South Africa, May 2005.
-
-
-
-
21
-
-
47249094367
-
-
Universidade Federal do Rio de Janeiro, COPPE/PEE, Tech. Rep. GTA-05-43, Sept
-
R. P. Laufer, P. B. Velloso, and O. C. M. B. Duarte, "Generalized Bloom Filters," Universidade Federal do Rio de Janeiro, COPPE/PEE, Tech. Rep. GTA-05-43, Sept. 2005.
-
(2005)
Generalized Bloom Filters
-
-
Laufer, R.P.1
Velloso, P.B.2
Duarte, O.C.M.B.3
-
23
-
-
0037810705
-
Pi: A Path Identification Mechanism to Defend against DDoS Attacks
-
Oakland, California, USA, May
-
A. Yaar, A. Perrig, and D. Song, "Pi: A Path Identification Mechanism to Defend against DDoS Attacks," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2003, pp. 93-107.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
24
-
-
33847305617
-
Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing
-
Philadelphia, PA, USA, Aug
-
H. Song, S. Dharmapurikar, J. Turner, and J. Lockwood, "Fast Hash Table Lookup Using Extended Bloom Filter: an Aid to Network Processing," in Proceedings of the ACM SIGCOMM'05 Conference, Philadelphia, PA, USA, Aug. 2005, pp. 181-192.
-
(2005)
Proceedings of the ACM SIGCOMM'05 Conference
, pp. 181-192
-
-
Song, H.1
Dharmapurikar, S.2
Turner, J.3
Lockwood, J.4
-
25
-
-
33750321695
-
Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines
-
Pisa, Italy, Sept
-
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese, "Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines," in Proceedings of the ACM SIGCOMM'06 Conference, Pisa, Italy, Sept. 2006, pp. 315-326.
-
(2006)
Proceedings of the ACM SIGCOMM'06 Conference
, pp. 315-326
-
-
Bonomi, F.1
Mitzenmacher, M.2
Panigrahy, R.3
Singh, S.4
Varghese, G.5
|