-
1
-
-
38549153397
-
Detecting flooding-based DDoS attacks
-
Glasgow, Scotland, June
-
Y. You, M. Zulkernine, and A. Haque, "Detecting flooding-based DDoS attacks," Proc. of the IEEE International Conference on Communications, Glasgow, Scotland, June 2007, pp. 1229-1234.
-
(2007)
Proc. of the IEEE International Conference on Communications
, pp. 1229-1234
-
-
You, Y.1
Zulkernine, M.2
Haque, A.3
-
2
-
-
25844461391
-
FIT: Fast internet traceback
-
Miami, Florida, USA, March
-
th Annual Joint. Conf. of the IEEE Computer & Communications Societies, Miami, Florida, USA, March 2005, pp. 1395-1406.
-
(2005)
th Annual Joint. Conf. of the IEEE Computer & Communications Societies
, pp. 1395-1406
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
4
-
-
25844492549
-
On the effectiveness of DDoS attacks on statistical filtering
-
Miami, Florida, USA
-
th Annual Joint Conf. of the IEEE Computer and Communications Societies, Miami, Florida, USA, vol. 2, 2005, pp. 1373-1383.
-
(2005)
th Annual Joint Conf. of the IEEE Computer and Communications Societies
, vol.2
, pp. 1373-1383
-
-
Li, Q.1
Chang, E.-C.2
Chan, M.C.3
-
5
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Feb
-
D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles." IEEE/ACM Trans. on Networking, vol. 13, no. 1, Feb. 2005, pp. 29-42.
-
(2005)
IEEE/ACM Trans. on Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
6
-
-
49049093934
-
Mitigating Distributed Denial-of-Service attack with deterministic bit marking
-
Y. Kim, J.-Y. Jo, F. Merat, M. Yang, and Y. Jiang, "Mitigating Distributed Denial-of-Service attack with deterministic bit marking," International Journal of Information Technology, vol. 11, no. 2, 2005, pp. 62-82
-
(2005)
International Journal of Information Technology
, vol.11
, Issue.2
, pp. 62-82
-
-
Kim, Y.1
Jo, J.-Y.2
Merat, F.3
Yang, M.4
Jiang, Y.5
-
7
-
-
27644518127
-
D-WARD: A source-end defense against flooding Denial-of-Service attacks
-
July
-
J. Mirkovic and P. Reiher, "D-WARD: a source-end defense against flooding Denial-of-Service attacks," IEEE Transactions Dependable and Secure Computing, vol. 2, no. 3, July 2005, pp. 216-232.
-
(2005)
IEEE Transactions Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
8
-
-
28844439716
-
A survey of active and passive defense mechanisms against DDoS attacks,
-
Technical Report C04/02, School of Information Technology, Deakin University, Australia, March
-
Y. Xiang, W. Zhou, and M. Chowdhury, "A survey of active and passive defense mechanisms against DDoS attacks," Technical Report C04/02, School of Information Technology, Deakin University, Australia, March 2004.
-
(2004)
-
-
Xiang, Y.1
Zhou, W.2
Chowdhury, M.3
-
9
-
-
33750956036
-
02-DN: An overlay-based distributed rate limit framework to defeat DDoS attacks
-
Mauritius
-
Y. Jing, Z. Xiao, X. Wang, and G. Zhang, "02-DN: an overlay-based distributed rate limit framework to defeat DDoS attacks," Proc. of International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL), Mauritius, 2006.
-
(2006)
Proc. of International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL)
-
-
Jing, Y.1
Xiao, Z.2
Wang, X.3
Zhang, G.4
-
10
-
-
42549129280
-
A coordinated detection and response scheme for distributed Denial-of-Service attacks
-
Istanbul, Turkey, June
-
H.-Y. Lam, C.-P. Li, S.-T. Chanson, and D.-Y. Yeung, "A coordinated detection and response scheme for distributed Denial-of-Service attacks," Proc. of the IEEE Conference on Communications, Istanbul, Turkey, June 2006, pp. 2165-2170.
-
(2006)
Proc. of the IEEE Conference on Communications
, pp. 2165-2170
-
-
Lam, H.-Y.1
Li, C.-P.2
Chanson, S.-T.3
Yeung, D.-Y.4
-
11
-
-
49049121351
-
A framework for collaborative DDoS defense
-
Miami, Florida, USA, December
-
J. Mirkovic, M. Robinson, P. Reiher, and G. Oikonomou, "A framework for collaborative DDoS defense," Proceedings of the 22nd Annual Computer Security Applications Conference, Miami, Florida, USA, December 2006, pp. 33-42.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 33-42
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
Oikonomou, G.4
-
12
-
-
0003552333
-
Controlling high bandwidth aggregates in the network,
-
Technical Report, AT & T Center for Internet Research at ICSI, July
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Inannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," Technical Report, AT & T Center for Internet Research at ICSI, July 2001.
-
(2001)
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Inannidis, J.4
Paxson, V.5
Shenker, S.6
-
13
-
-
33746544213
-
Proactive Control of Distributed Denial of Service Attacks with Source Router Preferential Dropping
-
Cairo, Egypt, January
-
Y. Fan, H.S. Hassanein, and P. Martin, "Proactive Control of Distributed Denial of Service Attacks with Source Router Preferential Dropping," ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Cairo, Egypt, January 2005, pp. 70-77.
-
(2005)
ACS/IEEE International Conference on Computer Systems and Applications (AICCSA)
, pp. 70-77
-
-
Fan, Y.1
Hassanein, H.S.2
Martin, P.3
-
14
-
-
49049113791
-
-
Topology Project University of Michigan, Inet: Internet Topology Generator, Available at topology.eecs.umich.edu/inet/, 2006.
-
Topology Project University of Michigan, "Inet: Internet Topology Generator," Available at topology.eecs.umich.edu/inet/, 2006.
-
-
-
-
15
-
-
0038052872
-
Random flow network modeling and simulations for DDoS attack mitigation
-
May
-
J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for DDoS attack mitigation," Communications, vol. 1, May 2003, pp. 487-491.
-
(2003)
Communications
, vol.1
, pp. 487-491
-
-
Kong, J.1
Mirza, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
16
-
-
49049113373
-
-
VINT Project U. C. Berkeley, NS2: network simulator, Available at http://www.isi.edu/nsnam/ns, 2006.
-
VINT Project U. C. Berkeley, "NS2: network simulator," Available at http://www.isi.edu/nsnam/ns, 2006.
-
-
-
-
17
-
-
49049093319
-
Towards systematic IDS evaluation
-
Arlington, Virginia, USA, June
-
C. Ko, A. Hussain, S. Schwab, R. Thomas, and B. Wilson, "Towards systematic IDS evaluation," Proc. of DETER Community Workshop, Arlington, Virginia, USA, June 2006, pp. 20-23.
-
(2006)
Proc. of DETER Community Workshop
, pp. 20-23
-
-
Ko, C.1
Hussain, A.2
Schwab, S.3
Thomas, R.4
Wilson, B.5
-
18
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
Washington DC, USA Apr
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R Govinda, "COSSACK: Coordinated suppression of simultaneous attacks," Proc. of the DARPA Information Survivability Conf. and Exposition III, Washington DC, USA Apr. 2003, pp. 2-13.
-
(2003)
Proc. of the DARPA Information Survivability Conf. and Exposition III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govinda, R.5
|