-
1
-
-
0003068282
-
Security Architecture for the Internet Protocol
-
IETF
-
Kent S, Atkinson R. RFC2401. Security Architecture for the Internet Protocol. IETF, 1998
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
3
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
IETF
-
Ferguson P, Senie D. RFC2827. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. IETF, 2000
-
(2000)
RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
4
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM, 2001
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
5
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
Li J, Mirkovic J, Wang M, et al. SAVE: Source address validity enforcement protocol. IEEE INFOCOM, 2002
-
(2002)
IEEE INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
-
6
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. ACM CCS, 2003
-
(2003)
ACM CCS
-
-
Jin, C.1
Wang, H.2
-
9
-
-
0142250001
-
ICMP traceback with cumulative path, an efficient solution for IP traceback
-
Information and Communications Security
-
Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an efficient solution for IP traceback. Information and Communications Security. LNCS, 2003. 124-135
-
(2003)
LNCS
, pp. 124-135
-
-
Lee, H.1
Thing, V.2
Xu, Y.3
-
11
-
-
0038059205
-
IP traceback with deterministic packet marking
-
4
-
A. Belenky N. Ansari 2003 IP traceback with deterministic packet marking IEEE Commun Lett 7 4 162 164
-
(2003)
IEEE Commun Lett
, vol.7
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
12
-
-
48349112377
-
Source address validation: Architecture and protocol design
-
Wu J, Ren G, Li X. Source address validation: Architecture and protocol design. ICNP, 2007
-
(2007)
ICNP
-
-
Wu, J.1
Ren, G.2
Li, X.3
-
13
-
-
54249142761
-
A source address validation architecture (SAVA) testbed and deployment experience
-
IETF
-
Wu J, Bi J, Li X, et al. RFC5210. A source address validation architecture (SAVA) testbed and deployment experience. IETF, 2008
-
(2008)
RFC
, vol.5210
-
-
Wu, J.1
Bi, J.2
Li, X.3
-
14
-
-
54249093879
-
A first-hop source address validation solution for SAVA
-
draft-wu-sava-solution-firsthop-eap-00
-
Wu J, Ren G, Bi J, et al. A first-hop source address validation solution for SAVA. IETF Internet Draft, draft-wu-sava-solution-firsthop-eap-00, 2007
-
(2007)
IETF Internet Draft
-
-
Wu, J.1
Ren, G.2
Bi, J.3
-
15
-
-
54249142761
-
Source Address validation architecture (SAVA) framework
-
draft-wu-sava-framework-01
-
Wu J, Bi J, Ren G, et al. Source Address validation architecture (SAVA) framework. IETF Internet Draft, draft-wu-sava-framework-01, 2007
-
(2007)
IETF Internet Draft
-
-
Wu, J.1
Bi, J.2
Ren, G.3
-
16
-
-
54249109052
-
Source Address verification architecture problem statement
-
draft-sava-problem-statement-02
-
Wu J, Ferguson P, Bi J, et al. Source Address verification architecture problem statement. IETF Internet Draft, draft-sava-problem-statement-02, 2007
-
(2007)
IETF Internet Draft
-
-
Wu, J.1
Ferguson, P.2
Bi, J.3
-
17
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
6
-
L. Gao 2001 On inferring autonomous system relationships in the Internet IEEE/ACM Trans Network-Ing 9 6 733 745
-
(2001)
IEEE/ACM Trans Network-Ing
, vol.9
, pp. 733-745
-
-
Gao, L.1
|