-
1
-
-
0021426851
-
A note on denial-of-service in operating systems
-
Virgil D. Gligor, "A note on denial-of-service in operating systems.," IEEE Trans. Software Eng., vol. 10, no. 3, pp. 320-324, 1984.
-
(1984)
IEEE Trans. Software Eng
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
3
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
New York. NY. USA, ACM Press
-
Frank Kargl, Joern Maier, and Michael Weber, "Protecting web servers from distributed denial of service attacks," in WWW '01: Proceedings of the 10th international conference on World Wide Web, New York. NY. USA, 2001, pp. 514-524,'ACM Press.
-
(2001)
WWW '01: Proceedings of the 10th international conference on World Wide Web
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
4
-
-
14844282689
-
Guaranteeing access in spite of distributed serviceflooding attacks
-
Virgil D. Gligor, "Guaranteeing access in spite of distributed serviceflooding attacks.," in Security Protocols Workshop, 2003, pp. 80-96.
-
(2003)
Security Protocols Workshop
, pp. 80-96
-
-
Gligor, V.D.1
-
5
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
Cristian Estan and George Varghese. "New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice," ACM Trans. Comput. Syst., vol. 21, no. 3, pp. 270-313. 2003.
-
(2003)
ACM Trans. Comput. Syst
, vol.21
, Issue.3
, pp. 270-313
-
-
Estan, C.1
Varghese, G.2
-
6
-
-
84860726329
-
-
Rangarajan Vasudevan. Z. Morley Mao, Oliver Spatscheck, and Jacobus van der Merwe, Reval: A tool for real-time evaluation of ddos mitigation strategies. in Proceedings of the 2006 USENIX Annual Technical Conferrence. 2006.
-
Rangarajan Vasudevan. Z. Morley Mao, Oliver Spatscheck, and Jacobus van der Merwe, "Reval: A tool for real-time evaluation of ddos mitigation strategies." in Proceedings of the 2006 USENIX Annual Technical Conferrence. 2006.
-
-
-
-
7
-
-
33645779745
-
Dcap: Detecting misbehaving flows via collaborative aggregate policing
-
Chen-Nee Chuah, Lakshminarayanan Subramanian, and Randy H. Katz, "Dcap: detecting misbehaving flows via collaborative aggregate policing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 5, pp. 5-18, 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.5
, pp. 5-18
-
-
Chuah, C.-N.1
Subramanian, L.2
Katz, R.H.3
-
8
-
-
0004132127
-
On the detection of defective members of large populations
-
Dec
-
Andrew Sterrett, "On the detection of defective members of large populations," The Annals of Mathematical Statistics, vol. 28. no. 4, pp. 1033-1036, Dec. 1957.
-
(1957)
The Annals of Mathematical Statistics
, vol.28
, Issue.4
, pp. 1033-1036
-
-
Sterrett, A.1
-
9
-
-
0001243071
-
The detection of defective members of large pop-ulations
-
Dec
-
Robert Dorfman, "The detection of defective members of large pop-ulations," The Annals of Mathematical Statistics, vol. 14, no. 4, pp. 436-440, Dec. 1943.
-
(1943)
The Annals of Mathematical Statistics
, vol.14
, Issue.4
, pp. 436-440
-
-
Dorfman, R.1
-
10
-
-
0012109964
-
-
The Honeynet Project, Addison-Wisley, Indianapolis, IN
-
The Honeynet Project. Know Your Enemy, Addison-Wisley, Indianapolis, IN, 2002.
-
(2002)
Know Your Enemy
-
-
-
11
-
-
84903755100
-
Honeypots for distributed denial-of-service attacks
-
N. Weiler, "Honeypots for distributed denial-of-service attacks." in Proceedings of WET ICE 2002.
-
Proceedings of WET ICE 2002
-
-
Weiler, N.1
-
13
-
-
11244324912
-
Mohonk: Mobile honeypots to trace unwanted traffic early
-
New York, NY, USA, ACM Press
-
Balachander Krishnamurthy, "Mohonk: mobile honeypots to trace unwanted traffic early," in NetT '04: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting, New York, NY, USA. 2004, pp. 277-282, ACM Press.
-
(2004)
NetT '04: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting
, pp. 277-282
-
-
Krishnamurthy, B.1
-
14
-
-
2442597231
-
Roaming Honeypots for Mitigating Servicelevel Denial-of-Service Attacks
-
Sherif M. Khattab. Chatree Sangpachatanaruk, Daniel Mossé, Rami Melhem, and Taieb Znati, "Roaming Honeypots for Mitigating Servicelevel Denial-of-Service Attacks," in ICDCS 2004.
-
ICDCS 2004
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Mossé, D.3
Melhem, R.4
Znati, T.5
-
15
-
-
33746954566
-
Honeypot back-propagation for mitigating spoofing distributed denial-ofservice attacks
-
Special Issue on Security in Grid and Distributed Systems, Sept
-
Sherif Khattab. Rami Melhem. Daniel Mossé, and Taieb Znati, "Honeypot back-propagation for mitigating spoofing distributed denial-ofservice attacks," Journal of Parallel and Distributed Computing (JPDC) Special Issue on Security in Grid and Distributed Systems, vol. 66, no. 9, pp. 1152-1164. Sept 2006.
-
(2006)
Journal of Parallel and Distributed Computing (JPDC)
, vol.66
, Issue.9
, pp. 1152-1164
-
-
Khattab, S.1
Melhem, R.2
Mossé, D.3
Znati, T.4
-
16
-
-
2942728016
-
Telling humans and computers apart automatically
-
Luis von Ahn, Manuel Blum, and John Langford, "Telling humans and computers apart automatically," Commun. ACM, vol. 47, no. 2, pp. 56-60, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Luis von Ahn, M.B.1
Langford, J.2
-
17
-
-
26444537503
-
Indexing information for data forensics
-
J. Ioannidis, A. Keromytis, and M. Yung, Eds
-
M. T. Goodrich, M. J. Atallah, and R. Tamassia, "Indexing information for data forensics," in Proceedings of the Third International Conference on Applied Cryptography and Network Security (ACNS). J. Ioannidis, A. Keromytis, and M. Yung, Eds., 2005, pp. 206-221.
-
(2005)
Proceedings of the Third International Conference on Applied Cryptography and Network Security (ACNS)
, pp. 206-221
-
-
Goodrich, M.T.1
Atallah, M.J.2
Tamassia, R.3
-
19
-
-
0042008122
-
Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels
-
Annalisa De Bonis and Ugo Vaccaro, "Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels," Theor. Comput. Sci., vol. 306. no. 1-3, pp. 223-243, 2003.
-
(2003)
Theor. Comput. Sci
, vol.306
, Issue.1-3
, pp. 223-243
-
-
Bonis, A.D.1
Vaccaro, U.2
-
20
-
-
0346404159
-
Broadcast anti-jamming systems
-
Yvo Desmedt, Rei Safavi-Naini, Huaxiong Wang, Lynn Batten, Chris Charnes, and Josef Pieprzyk, "Broadcast anti-jamming systems," Comput. Networks, vol. 35, no. 2-3, pp. 223-236, 2001.
-
(2001)
Comput. Networks
, vol.35
, Issue.2-3
, pp. 223-236
-
-
Desmedt, Y.1
Safavi-Naini, R.2
Wang, H.3
Batten, L.4
Charnes, C.5
Pieprzyk, J.6
-
21
-
-
0041464246
-
A survey on combinatorial group testing algorithms with applications to dna library screening
-
Amer. Math. Soc
-
Hung Q. Ngo and Ding-Zhu Du, "A survey on combinatorial group testing algorithms with applications to dna library screening." Disctrete mathematical pwblems with medical applications (New Brunswick, NJ) DIMACS Ser. Discrete Math. Theoret. Comput. Sci., Amer. Math. Soc. vol. 55, pp. 171-182, 2000.
-
(2000)
Disctrete mathematical pwblems with medical applications (New Brunswick, NJ) DIMACS Ser. Discrete Math. Theoret. Comput. Sci
, vol.55
, pp. 171-182
-
-
Ngo, H.Q.1
Du, D.-Z.2
-
23
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
April
-
Moheeb Abu Rajab, Jay Zarfoss. Fabian Monrose, and Andreas Terzis, "My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging," in Proceedings of USENIX/HotBots, April 2007.
-
(2007)
Proceedings of USENIX/HotBots
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
24
-
-
77953077374
-
-
Jaeyeon Jung, Balachander Krishnamurthy. and Michael Rabinovich, Flash crowds and denial of service attacks: characterization and implications for cdns and web sites, in WWW '02: Proceedings of the 11th international conference on World Wide Web. New York. NY, IJSA, 2002, pp. 293-304, ACM Press.
-
Jaeyeon Jung, Balachander Krishnamurthy. and Michael Rabinovich, "Flash crowds and denial of service attacks: characterization and implications for cdns and web sites," in WWW '02: Proceedings of the 11th international conference on World Wide Web. New York. NY, IJSA, 2002, pp. 293-304, ACM Press.
-
-
-
-
25
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds
-
Boston, MA, May
-
Srikanth Kandula. Dina Katabi, Matthias Jacob, and Arthur W. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds," in 2nd Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005.
-
(2005)
2nd Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
26
-
-
51349112249
-
-
Live Baiting for Service-level DoS Attackers, April 2006
-
"Live Baiting for Service-level DoS Attackers." http://www.cs.pitt.edu/~skhattab/livebait.pdf. April 2006.
-
-
-
-
27
-
-
0003629990
-
-
Federal Information Processing Standards Publication 180-2, August
-
Federal Information Processing Standards Publication 180-2. "Secure hash standard." August 2002.
-
(2002)
Secure hash standard
-
-
-
29
-
-
8344272005
-
Stochastic models for generating synthetic http source traffic
-
March
-
J. Cao, W.S. Cleveland, Y. Gao. K. Jeffay, F.D. Smith, and M.C. Weigle, "Stochastic models for generating synthetic http source traffic," in IEEE Infocom 2004, March 2004, vol. 3, pp. 1546-1557.
-
(2004)
IEEE Infocom 2004
, vol.3
, pp. 1546-1557
-
-
Cao, J.1
Cleveland, W.S.2
Gao, Y.3
Jeffay, K.4
Smith, F.D.5
Weigle, M.C.6
-
30
-
-
1642283261
-
A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,
-
Tech. Rep. 020018, Computer Science Department, University of California. Los Angeles
-
Jelena Mirkovic, Janice Martin, and Peter Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Tech. Rep. 020018, Computer Science Department, University of California. Los Angeles, 2002.
-
(2002)
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
31
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis, "Detecting targeted attacks using shadow honeypots." in Proceedings of the 14th USENIX Security Symposium, 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
32
-
-
79955747674
-
-
Vyas Sekar, Nick Duffield, Oliver Spatscheck, Jacobus van der Merwe, and Hui Zhang, Lads: Large-scale automated ddos detection system, in Proceedings of the 2006 USENIX Annual Technical Conference, 2006.
-
Vyas Sekar, Nick Duffield, Oliver Spatscheck, Jacobus van der Merwe, and Hui Zhang, "Lads: Large-scale automated ddos detection system," in Proceedings of the 2006 USENIX Annual Technical Conference, 2006.
-
-
-
-
33
-
-
33845591142
-
Ddosresilient scheduling to counter application layer attacks under imperfect detection
-
Barcelona, Spain. April, IEEE
-
S. Ranjan, R. Swaminathan. M. Uysal, and E. Knightly. "Ddosresilient scheduling to counter application layer attacks under imperfect detection." in Proceedings of the IEEE Infocom, Barcelona, Spain. April 2006, IEEE.
-
(2006)
Proceedings of the IEEE Infocom
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
37
-
-
33750310218
-
Using packet symmetry to curtail malicious traffic
-
Christian Kreibich, Andrew Warfield, Jon Crowcroft, Steven Hand, and Ian Pratt, "Using packet symmetry to curtail malicious traffic," in Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets-IV), 2005.
-
(2005)
Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets-IV)
-
-
Kreibich, C.1
Warfield, A.2
Crowcroft, J.3
Hand, S.4
Pratt, I.5
-
39
-
-
51349120214
-
ICMP Traceback Messages
-
Steven M. Bellovin, Marcus Leech, and Tom Taylor, "ICMP Traceback Messages," in draft-ietf-itrace-01.txt, intei-net-draft, October 2001. Expiivd draft.
-
draft-ietf-itrace-01.txt, intei-net-draft, October 2001. Expiivd draft
-
-
Bellovin, S.M.1
Leech, M.2
Taylor, T.3
-
40
-
-
4544272175
-
-
Ratul Mahajan, Steven M. Bellovin, Sally Floyd. John Ioannidis, Vern Paxson, and Scott Shenker. "Controlling high bandwidth aggregates in the network," vol. 32, no. 3, pp. 62-73, 2002.
-
(2002)
Controlling high bandwidth aggregates in the network
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
|