-
1
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Regency H, ed, IEEE, Dallas
-
Siris VA, Papagalou F. "Application of anomaly detection algorithms for detecting SYN flooding attacks." Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). IEEE, Dallas, 2004. 2050-2054.
-
(2004)
Global Telecommunications Conf. (GLOBECOM
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
2
-
-
4143081502
-
-
Jin SY, Yeung DS. A covariance analysis model for DDoS attack detection. IEEE Communications Society, IEEE Jnt'l Conf. 2004 In: Baal-Schem J, Bregni S, eds. Communications, Paris: 2004. 1882-1886.
-
Jin SY, Yeung DS. "A covariance analysis model for DDoS attack detection." IEEE Communications Society, IEEE Jnt'l Conf. 2004 In: Baal-Schem J, Bregni S, eds. Communications, Paris: 2004. 1882-1886.
-
-
-
-
3
-
-
4143080368
-
Transient Performance of PacketScore for Blocking DDoS attack
-
Jun
-
M.C. Chuah, W.C. Lau, Y. Kim, and H.J. Chao, "Transient Performance of PacketScore for Blocking DDoS attack." IEEE ICC, Jun. 2004.
-
(2004)
IEEE
, vol.199
-
-
Chuah, M.C.1
Lau, W.C.2
Kim, Y.3
Chao, H.J.4
-
4
-
-
8344261545
-
PacketScore: Statistics-based Overload Control against Distributed Denial of Service Attacks
-
Apr
-
Y. Kim, W.C. Lau, M.C. Chuah, and H.J. Chao, "PacketScore: Statistics-based Overload Control against Distributed Denial of Service Attacks," IEEE Infocom, Apr. 2004.
-
(2004)
IEEE Infocom
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
6
-
-
0027647490
-
Early Detection Gateways for Congestion Avoidance
-
Floyd S, Jacobson V. Random. "Early Detection Gateways for Congestion Avoidance." IEEE/ACM Transactions on Networking, 1993,1(4):397-413
-
(1993)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Random, J.V.2
-
7
-
-
0013264090
-
Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management,
-
July
-
João B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee and Raman K. Mehra "Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management,", Journal of Network and Systems Management, July 2002, Volume 10, Number 2: 225-254.
-
(2002)
Journal of Network and Systems Management
, vol.10
, Issue.2
, pp. 225-254
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Mehra, R.K.5
-
8
-
-
33847368809
-
Beyond the perimeter: The need for early detection of denial of service attacks
-
Pages
-
Haggerty, J.; Qi Shi; Merabti, M. "Beyond the perimeter: the need for early detection of denial of service attacks," Computer Security Applications Conference, 2002. Proceedings. 18th Annual Volume, Issue, 2002 Page(s): 413-422.
-
(2002)
Computer Security Applications Conference, 2002. Proceedings. 18th Annual Volume, Issue
, pp. 413-422
-
-
Haggerty, J.1
Shi, Q.2
Merabti, M.3
-
9
-
-
27644594619
-
-
Haggerty, J.; Qi Shi; Merabti, M. Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking Selected Areas in Communications, IEEE Journal on 23, Issue 10, Oct. 2005 Page(s): 1994 - 2002
-
Haggerty, J.; Qi Shi; Merabti, M. "Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking Selected Areas in Communications," IEEE Journal on Volume 23, Issue 10, Oct. 2005 Page(s): 1994 - 2002
-
-
-
-
11
-
-
25844492549
-
On the Effectiveness of DDoS Attacks on Statistical Filtering
-
Mar
-
Q. Li, E.C. Chang, and M.C. Chan, "On the Effectiveness of DDoS Attacks on Statistical Filtering," IEEE Infocom, Mar.2005.
-
(2005)
IEEE Infocom
-
-
Li, Q.1
Chang, E.C.2
Chan, M.C.3
-
12
-
-
50249170139
-
-
Asta Networks Inc
-
Asta Networks Inc., http://www.astanetworks.com.
-
-
-
|