-
1
-
-
49049105571
-
What is Egress Filtering and How can I Implement it? Feb 2000, the SANS Institute
-
Online
-
C. Brenton, "What is Egress Filtering and How can I Implement it?" Feb 2000, the SANS Institute. [Online], Available: http: //www.sans.org/rr/paper.php?id=1059
-
Available: http
-
-
Brenton, C.1
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
October, Online, Available
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer, "Xen and the art of virtualization," in Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, [Online], Available: citeseer.ist.psu.edu/dragovic03xen.html
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
3
-
-
49049114627
-
-
"Xensource," http://www.xensource.com/products/xen/.
-
-
-
-
4
-
-
84874744472
-
Using packet symmetry to curtail malicious traffic
-
C. Kreibich, A. Warfield, J. Crowcroft, S. Hand, and I. Pratt, "Using packet symmetry to curtail malicious traffic," Proc. ACM HotNets 2005.
-
Proc. ACM HotNets 2005
-
-
Kreibich, C.1
Warfield, A.2
Crowcroft, J.3
Hand, S.4
Pratt, I.5
-
5
-
-
49049106855
-
-
"Vmware," http://www.vmware.com/.
-
-
-
-
6
-
-
49049113351
-
-
"Virtual Server," http://www.microsoft.com/servers/default. mspx.
-
Virtual Server
-
-
-
7
-
-
84978438355
-
Scale and performance in the denali isolation kernel
-
Online, Available
-
A. Whitaker, M. Shaw, and S. D. Gribble, "Scale and performance in the denali isolation kernel," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 195-209, 2002. [Online]. Available: http://portal.acm.org/citation. cfm?id=844147
-
(2002)
SIGOPS Oper. Syst. Rev
, vol.36
, Issue.SI
, pp. 195-209
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
-
8
-
-
84944955094
-
-
Online, Available
-
J. Dike, "A user-mode port of the Linux kernel," 2000. [Online]. Available: http://www.usenix.org/publications/library/Proceedings/ als2000/dike.html
-
(2000)
A user-mode port of the Linux kernel
-
-
Dike, J.1
-
9
-
-
1242321281
-
-
Apr
-
C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art," vol. 44, no. 5, pp. 643-666, Apr. 2004.
-
(2004)
DDoS attacks and defense mechanisms: Classification and state-of-the-art
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
11
-
-
49049122122
-
-
J. Mirkovic, D-WARD: Source-end defense against distributed denial-of-service attacks, Ph.D. dissertation. [Online]. Available: citeseer.ist.psu.edu/mirkovic03dward.htinl
-
J. Mirkovic, "D-WARD: Source-end defense against distributed denial-of-service attacks," Ph.D. dissertation. [Online]. Available: citeseer.ist.psu.edu/mirkovic03dward.htinl
-
-
-
-
12
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society. IEEE Computer Society Press, May, Online, Available
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society. IEEE Computer Society Press, May 1997, pp. 208-223. [Online]. Available: citeseer.ist.psu.edu/article/schuba97analysis.html
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
13
-
-
49049098367
-
-
CHECKPOINT INC. 1996. TCP SYN flooding attack and the firewall-1 SYNDefender. Checkpoint Inc
-
"CHECKPOINT INC. 1996. TCP SYN flooding attack and the firewall-1 SYNDefender. Checkpoint Inc.."
-
-
-
-
15
-
-
49049103647
-
-
"Xen networking," http://wiki.xensource.com/xenwiki/ XenNetworking.
-
Xen networking
-
-
-
16
-
-
33745137593
-
-
Online, Available
-
R. Prasad, M. Murray, C. Dovrolis, and K. Claffy, "Bandwidth estimation: Metrics, measurement techniques, and tools," 2003. [Online]. Available: citeseer.ist.psu.edu/prasadO3bandwidth.html
-
(2003)
Bandwidth estimation: Metrics, measurement techniques, and tools
-
-
Prasad, R.1
Murray, M.2
Dovrolis, C.3
Claffy, K.4
-
17
-
-
84883336377
-
Optimizing network virtualization in xen
-
May
-
A. Menon, A. L. Cox, and W. Zwaenepoel, "Optimizing network virtualization in xen," in USENIX Annual Technical Conference, May 2006, pp. 15-28.
-
(2006)
USENIX Annual Technical Conference
, pp. 15-28
-
-
Menon, A.1
Cox, A.L.2
Zwaenepoel, W.3
-
18
-
-
33745963010
-
Live updating operating systems using virtualization
-
New York, NY, USA: ACM Press
-
H. Chen, R. Chen, F. Zhang, B. Zang, and P.-C. Yew, "Live updating operating systems using virtualization," in VEE '06: Proceedings of the 2nd international conference on Virtual execution environments. New York, NY, USA: ACM Press, 2006, pp. 35-44.
-
(2006)
VEE '06: Proceedings of the 2nd international conference on Virtual execution environments
, pp. 35-44
-
-
Chen, H.1
Chen, R.2
Zhang, F.3
Zang, B.4
Yew, P.-C.5
-
19
-
-
33745957366
-
A new approach to real-time checkpointing
-
New York, NY, USA: ACM Press
-
A. Cunei and J. Vitek, "A new approach to real-time checkpointing," in VEE '06: Proceedings of the 2nd international conference on Virtual execution environments. New York, NY, USA: ACM Press, 2006, pp. 68-77.
-
(2006)
VEE '06: Proceedings of the 2nd international conference on Virtual execution environments
, pp. 68-77
-
-
Cunei, A.1
Vitek, J.2
-
20
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Online, Available
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen, "Revirt: enabling intrusion analysis through virtual-machine logging and replay," SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 211-224, 2002. [Online]. Available: http://portal.acm.org/citation.cfm?id=844148
-
(2002)
SIGOPS Oper. Syst. Rev
, vol.36
, Issue.SI
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
21
-
-
33745944184
-
Secure and practical defense against code-injection attacks using software dynamic translation
-
New York, NY, USA: ACM Press
-
W. Hu, J. Hiser, D. Williams, A. Filipi, J. W. Davidson, D. Evans, J. C. Knight, A. Nguyen-Tuong, and J. Rowanhill, "Secure and practical defense against code-injection attacks using software dynamic translation," in VEE '06: Proceedings of the 2nd international conference on Virtual execution environments. New York, NY, USA: ACM Press, 2006, pp. 2-12.
-
(2006)
VEE '06: Proceedings of the 2nd international conference on Virtual execution environments
, pp. 2-12
-
-
Hu, W.1
Hiser, J.2
Williams, D.3
Filipi, A.4
Davidson, J.W.5
Evans, D.6
Knight, J.C.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
22
-
-
78650880166
-
Flexible os support and applications for trusted computing
-
May 2003, Online, Available
-
T. Garfinkel, M. Rosenblum, and D. Boneh, "Flexible os support and applications for trusted computing," in Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS-VIII), May 2003. [Online]. Available: citeseer.ist.psu.edu/garfinke103flexible.html
-
Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS-VIII)
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
|