-
1
-
-
48749083290
-
-
S. Specht, M. and R. B. Lee., Distributed Denial of Service: Taxonomies of Attacks; Tools and Countermeasures. Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004, pp.543-550.
-
S. Specht, M. and R. B. Lee., Distributed Denial of Service: Taxonomies of Attacks; Tools and Countermeasures. Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004, pp.543-550.
-
-
-
-
3
-
-
33749377422
-
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques., ADMA
-
U. Tariq, M. Hang, and et al., A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques., ADMA LNAI 4093, 2006 pp.1025-1036.
-
(2006)
LNAI
, vol.4093
, pp. 1025-1036
-
-
Tariq, U.1
Hang, M.2
and et, al.3
-
6
-
-
33745898814
-
-
J. Kang, Y. Zhang, and et al., A Formalized Taxonomy of DDoS Attacks based on Similarity, ISI 3975, 2006, pp. 717-719.
-
(2006)
A Formalized Taxonomy of DDoS Attacks based on Similarity
, vol.ISI 3975
, pp. 717-719
-
-
Kang, J.1
Zhang, Y.2
and et, al.3
-
7
-
-
1242287724
-
-
ACM
-
A. Hussain, J. Heidemann, C. Papadopoulos, A Framework for Classifying Denial of Service Attacks, ACM, 2003, pp.99-110
-
(2003)
A Framework for Classifying Denial of Service Attacks
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
8
-
-
51149105210
-
Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study
-
B. Joao, D. Cabrera, and et al. Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study, Integrated Network Management Proceedings, 2001, pp. 609-622.
-
(2001)
Integrated Network Management Proceedings
, pp. 609-622
-
-
Joao, B.1
Cabrera, D.2
and et, al.3
-
10
-
-
0034497721
-
Distributed denial of service attacks
-
Man, and Cybernetics
-
F. Lau, S. H. Rubin, and et al., Distributed denial of service attacks, In Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, 2000.
-
(2000)
Proceedings of 2000 IEEE International Conference on Systems
-
-
Lau, F.1
Rubin, S.H.2
and et, al.3
-
11
-
-
0001887844
-
Hash-Based IP Traceback
-
August
-
A. C. Snoeren, C. Partridge, and et al., Hash-Based IP Traceback, In Proceedings of ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
-
-
Snoeren, A.C.1
Partridge, C.2
and et, al.3
-
12
-
-
0034997397
-
Advanced and authenticated marking schemes for IP Traceback
-
D. X. Song and A. Perrig, Advanced and authenticated marking schemes for IP Traceback, IEEE Infocom, 2001.
-
IEEE Infocom, 2001
-
-
Song, D.X.1
Perrig, A.2
-
14
-
-
0004194675
-
-
Internet draft, draft-ietf-itrace-01.txt, Oct
-
S. M. Bellovin, ICMP traceback messages, Internet draft, http:// search.ietf.org/internetrafts/draft-ietf-itrace-01.txt, Oct. 2001.
-
(2001)
ICMP traceback messages
-
-
Bellovin, S.M.1
-
15
-
-
0001647024
-
Practical network support for IP Traceback
-
Aug
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Practical network support for IP Traceback, In Proceedings of 2000 ACM SIGCOMM Conference, Aug. 2000.
-
(2000)
Proceedings of 2000 ACM SIGCOMM Conference
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
17
-
-
0036036742
-
Resilient Overlay Networks
-
October
-
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, R. Morris, Resilient Overlay Networks,In Proceedings of 18th ACM SOSP, October 2001.
-
(2001)
Proceedings of 18th ACM SOSP
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, M.F.3
Morris, R.4
-
18
-
-
48749095217
-
-
Distributed Denial of Service attacks and theirdefenses
-
Distributed Denial of Service attacks and theirdefenses:http:// www.lancs.ac.uk/postgrad/pissias/netsec/DDoS/
-
-
-
-
20
-
-
48749095661
-
-
CERT Coordination Center, erkms and li0n worms, http:// www.cert.org/incident∉tes/IN-2001-03.html
-
CERT Coordination Center, erkms and li0n worms, http:// www.cert.org/incident∉tes/IN-2001-03.html
-
-
-
-
21
-
-
48749105822
-
-
CERT Coordination Center, Ramen worm, http://www.cert.org/ incident_notes/IN-2001-01.html
-
Ramen worm
-
-
-
23
-
-
33845600302
-
-
Tripwire, Tripwire for servers, http://www.tripwire.com/products/ servers/
-
Tripwire for servers
-
-
-
24
-
-
84983188846
-
-
McAfee, Personal Firewall, http://www.mcafee.com/myapps/firewall/ ov_firewall.asp
-
Personal Firewall
-
-
-
27
-
-
41049102257
-
-
Information Sciences Institute
-
Information Sciences Institute, Dynabone, http://www.isi.edu/ dynabone/.
-
Dynabone
-
-
-
28
-
-
48749113132
-
-
Department of Electrical and Computer Engineering, Rutgers University
-
G. Zhang, M. Parashar, Cooperative Mechanism against DDOS Attacks, the Applied Software Systems Laboratory, Department of Electrical and Computer Engineering, Rutgers University, 2005.
-
(2005)
Cooperative Mechanism against DDOS Attacks, the Applied Software Systems Laboratory
-
-
Zhang, G.1
Parashar, M.2
-
30
-
-
1242287724
-
-
ACM
-
A. Hussain, J. Heidemann, A Framework for Classifying Denial of Service Attacks, SIGCOMM, ACM, 2003, pp.99-110.
-
(2003)
A Framework for Classifying Denial of Service Attacks, SIGCOMM
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
-
31
-
-
7644227432
-
Sophistication in distributed denial-of-service attacks on the Internet
-
10 October
-
V. A. Kumar, Sophistication in distributed denial-of-service attacks on the Internet, CURRENT SCIENCE, VOL. 87, NO. 7, 10 October, 2004, pp.885-888.
-
(2004)
CURRENT SCIENCE
, vol.87
, Issue.7
, pp. 885-888
-
-
Kumar, V.A.1
-
32
-
-
24644453625
-
-
ISPEC, Springer-Verlag Berlin Heidelberg
-
R. Jalili, F. Imani-Mehr, Detection of Distributed Denial of Service Attacks Using Statistical Pre-Prossesor and Unsupervised Neural Network", ISPEC, Springer-Verlag Berlin Heidelberg, 2005, pp. 192-203
-
(2005)
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Prossesor and Unsupervised Neural Network
, pp. 192-203
-
-
Jalili, R.1
Imani-Mehr, F.2
-
33
-
-
13944272291
-
-
Springer-Verlag Berlin Heidelberg
-
M. Li, J. Liu, and D. Long, Probability Principle of Reliable Approach to detect signs of DDOS Flood Attacks, PDCAT, Springer-Verlag Berlin Heidelberg, 2004, pp.596-599.
-
(2004)
Probability Principle of Reliable Approach to detect signs of DDOS Flood Attacks, PDCAT
, pp. 596-599
-
-
Li, M.1
Liu, J.2
Long, D.3
-
36
-
-
9444219650
-
-
Springer-Valag Berlin Heidelberg
-
G. Dimitris, T. Ioannis, and D. Evangelos, Feature Selection for Robust Detection of Distributed Denial of service Attacks using Genetic Algorithm, SETN, Springer-Valag Berlin Heidelberg, 2004, pp.276-281.
-
(2004)
Feature Selection for Robust Detection of Distributed Denial of service Attacks using Genetic Algorithm, SETN
, pp. 276-281
-
-
Dimitris, G.1
Ioannis, T.2
Evangelos, D.3
|