-
2
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art", Computer Networks 44 (2004) 643-666.
-
(2004)
Computer Networks
, vol.44
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
4
-
-
0002000920
-
Denial-of-Service Attacks Rip the Internet
-
Apr
-
L. Garber, "Denial-of-Service Attacks Rip the Internet", Computer, Apr 2000, pp.12-17.
-
(2000)
Computer
, pp. 12-17
-
-
Garber, L.1
-
5
-
-
33646920013
-
Hash-Based IP Traceback
-
SIGCOMM, Aug
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, and C.E. Jones, "Hash-Based IP Traceback", 2001, SIGCOMM, Aug 2001, pp.27-31.
-
(2001)
, pp. 27-31
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
-
6
-
-
0033650584
-
-
Department of Computer Science and Engineering
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, "Practical Network Support for IP Traceback", Department of Computer Science and Engineering, 2000.
-
(2000)
Practical Network Support for IP Traceback
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
7
-
-
48649100074
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
Jun
-
D.X. Song, A. Perring, "Advanced and Authenticated Marking Schemes for IP Traceback", SIGCOMM, Jun 2000.
-
(2000)
SIGCOMM
-
-
Song, D.X.1
Perring, A.2
-
9
-
-
48649092046
-
Efficient and Robust IP Traceback
-
is/GRP/Projects /IP_Traceback.htm
-
M. Soshi, "Efficient and Robust IP Traceback", http://www.jaist.ac.jp/is/GRP/Projects /IP_Traceback.htm.
-
-
-
Soshi, M.1
-
12
-
-
48649103067
-
-
RCF2267, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, 1998.
-
RCF2267, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", 1998.
-
-
-
-
15
-
-
30944455279
-
Protect E-commerce against DDoS Attacks with Improved D-WARD Detection System
-
March
-
J. Kang, Z. Zhang, and J. B. Ju, "Protect E-commerce against DDoS Attacks with Improved D-WARD Detection System", IEEE International Conference on e-Technology, e-Commerce and e-Service, March 2005.
-
(2005)
IEEE International Conference on e-Technology, e-Commerce and e-Service
-
-
Kang, J.1
Zhang, Z.2
Ju, J.B.3
-
17
-
-
0029356674
-
Link-Sharing and resource management models for packet networks
-
August
-
S. Floyd and V. Jacobson, "Link-Sharing and resource management models for packet networks", IEEE/ACM Transactions on Networking, August 1995.
-
(1995)
IEEE/ACM Transactions on Networking
-
-
Floyd, S.1
Jacobson, V.2
-
19
-
-
48649091636
-
-
Linux Kernel, The Linux Kernel Archives, http://www.kernel. org/.
-
Linux Kernel, "The Linux Kernel Archives", http://www.kernel. org/.
-
-
-
-
20
-
-
48649083728
-
-
G. Foundation,Gentoo Linux, http:// www. gentoo.org/main/en/ about.xml.
-
G. Foundation,"Gentoo Linux", http:// www. gentoo.org/main/en/ about.xml.
-
-
-
-
21
-
-
77951593523
-
the de facto standard for intrusion detection- prevention
-
Snort, "the de facto standard for intrusion detection- prevention", http://www.snort.org/
-
-
-
-
22
-
-
0031274649
-
Wide-Area Internet Traffic Patterns and Characteristics
-
November December
-
N K. Thompson, G. J. Miller, and R. Wilder, "Wide-Area Internet Traffic Patterns and Characteristics". IEEE Network, Vol. II, No. 6, November December 1997.
-
(1997)
IEEE Network
, vol.2
, Issue.6
-
-
Thompson, N.K.1
Miller, G.J.2
Wilder, R.3
|