-
2
-
-
51349097378
-
-
Two root servers targeted by botnet. PC Advisor (pcadvisor.co.uk), 02/07/2007.
-
Two root servers targeted by botnet. PC Advisor (pcadvisor.co.uk), 02/07/2007.
-
-
-
-
3
-
-
51349131908
-
-
Phish fighters floored by DDoS assault. The Register (theregister.co.uk), 02/20/2007.
-
Phish fighters floored by DDoS assault. The Register (theregister.co.uk), 02/20/2007.
-
-
-
-
4
-
-
51349099390
-
-
Surge in hijacked PC networks. BBC (bbc.co.uk), 03/19/2007.
-
Surge in hijacked PC networks. BBC (bbc.co.uk), 03/19/2007.
-
-
-
-
5
-
-
51349140859
-
-
Telegraph floored by DDoS attack. The Register (theregister.co.uk), 05/22/2007.
-
Telegraph floored by DDoS attack. The Register (theregister.co.uk), 05/22/2007.
-
-
-
-
6
-
-
51349131009
-
-
FBI busts alleged DDoS mafia. Security Focus (securityfocus.com). 08/26/2004.
-
FBI busts alleged DDoS mafia. Security Focus (securityfocus.com). 08/26/2004.
-
-
-
-
7
-
-
21644461880
-
Moderately hard, memory-bound functions
-
299-327
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Trans. Inter. Tech., 5(2):299-327, 2005.
-
(2005)
ACM Trans. Inter. Tech
, vol.5
, Issue.2
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
8
-
-
84945709595
-
Development of sampling plans by using sequential (item by item) selection techniques and digital computers
-
I. R. C. T. Fan, M. E. Muller. Development of sampling plans by using sequential (item by item) selection techniques and digital computers. J. Amer. Statist. Assoc., 57:387-402, 1962.
-
(1962)
J. Amer. Statist. Assoc
, vol.57
, pp. 387-402
-
-
Fan, I.R.C.T.1
Muller, M.E.2
-
12
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
New York, NY, USA, ACM Press
-
C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: an effective defense against spoofed DDoS traffic. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 30-41, New York, NY, USA, 2003, ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
14
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. SIGCOMM Comput. Commun. Rev., 32(3):62-73, 2002.
-
(2002)
SIGCOMM Comput. Commun. Rev
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
15
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
Washington, DC, USA, IEEE Computer Society
-
D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. In ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, page 411, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 411
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
16
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 24(2):115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
17
-
-
34648867936
-
A framework for a collaborative DDoS defense
-
Washington, DC, USA, IEEE Computer Society
-
G. Oikonomou, J. Mirkovic, P. Reiher, and M. Robinson. A framework for a collaborative DDoS defense. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 33-42, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 33-42
-
-
Oikonomou, G.1
Mirkovic, J.2
Reiher, P.3
Robinson, M.4
-
18
-
-
0033650584
-
Practical network support for IP traceback
-
New York, NY, USA, ACM Press
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 295-306, New York, NY, USA. 2000, ACM Press.
-
(2000)
SIGCOMM '00: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
19
-
-
33749052103
-
Mitigating DoS attacks through selective bin verification
-
M. Sherr, M. B. Greenwald, C. A. Gunter, S. Khanna, and S. S. Venkatesh. Mitigating DoS attacks through selective bin verification. In IEEE ICNP Workshop on Secure Network Protocols (NPSec), pages 7-12, 2005.
-
(2005)
IEEE ICNP Workshop on Secure Network Protocols (NPSec)
, pp. 7-12
-
-
Sherr, M.1
Greenwald, M.B.2
Gunter, C.A.3
Khanna, S.4
Venkatesh, S.S.5
-
21
-
-
33845924479
-
A middleware system for protecting against application level denial of service attacks
-
M. Srivatsa, A. Iyengar, J. Yin, and L. Liu. A middleware system for protecting against application level denial of service attacks. In Middleware, pages 260-280, 2006.
-
(2006)
Middleware
, pp. 260-280
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
22
-
-
33750366503
-
DDoS defense by offense
-
New York, NY, USA, ACM Press
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS defense by offense. In SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 303-314, New York, NY, USA, 2006, ACM Press.
-
(2006)
SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
23
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
Washington, DC, USA, IEEE Computer Society
-
X. Wang and M. K. Reiter. Defending against denial-of-service attacks with puzzle auctions. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 78, Washington, DC, USA, 2003, IEEE Computer Society.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 78
-
-
Wang, X.1
Reiter, M.K.2
-
25
-
-
33750308365
-
A DoS-limiting network architecture
-
New York, NY, USA, ACM Press
-
X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network architecture. In SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, aichitectures, and protocols for computer communications, pages 241-252, New York, NY, USA, 2005, ACM Press.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, aichitectures, and protocols for computer communications
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
26
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw., 13(1):29-42, 2005.
-
(2005)
IEEE/ACM Trans. Netw
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
27
-
-
33749830235
-
Adaptive defense against various network attacks
-
IEEE Press
-
C. C. Zou. N. Duffield, D. Towsley, and W. Gong. Adaptive defense against various network attacks. In IEEE Journal on Selected Areas in Communications, volume 24, pages 1877-1888, IEEE Press, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 1877-1888
-
-
Zou, C.C.1
Duffield, N.2
Towsley, D.3
Gong, W.4
|