-
1
-
-
55849140062
-
The Continuing Denial of Service Threat Posed by DNS Recursion
-
US-CERT report, "The Continuing Denial of Service Threat Posed by DNS Recursion", 2006.
-
(2006)
US-CERT report
-
-
-
2
-
-
55849130613
-
-
SSAC Advisory SAC008, DNS Distributed Denial of Service (DDOS) Attacks, 2006.
-
SSAC Advisory SAC008, "DNS Distributed Denial of Service (DDOS) Attacks", 2006.
-
-
-
-
3
-
-
55849138935
-
-
CERT Advisory CA-98.01. Smurf IP denial-of-service attacks, 1998, http://www.cert.org/advisories/CA-98-01.html
-
CERT Advisory CA-98.01. "Smurf IP denial-of-service attacks", 1998, http://www.cert.org/advisories/CA-98-01.html
-
-
-
-
4
-
-
55849146899
-
-
CERT Advisory CA-96.21. TCP SYN flooding and IP spoofing, 2000, http://www.cert.org/advisories/CA-96-21.html
-
CERT Advisory CA-96.21. "TCP SYN flooding and IP spoofing", 2000, http://www.cert.org/advisories/CA-96-21.html
-
-
-
-
6
-
-
55849137538
-
-
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat3 750/index.htm
-
-
-
-
10
-
-
17644411571
-
-
C. Jin, H. Wang, and K.G. Shin, Hop-count filtering, An effective defense against spoofed DDoS traffic, in Proceedings of ACM CCS 2003.
-
C. Jin, H. Wang, and K.G. Shin, Hop-count filtering, "An effective defense against spoofed DDoS traffic", in Proceedings of ACM CCS 2003.
-
-
-
-
12
-
-
38149059001
-
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network
-
L.Z. Xie, J. Bi, J.P. Wu, "An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network", Lecture Notes in Computer Science, Vol. 4490, pp801-808, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4490
, pp. 801-808
-
-
Xie, L.Z.1
Bi, J.2
Wu, J.P.3
-
13
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Daw, X. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback", in Proceedings IEEE INFOCOMM 2001.
-
(2001)
Proceedings IEEE INFOCOMM
-
-
Daw, X.S.1
Perrig, A.2
-
14
-
-
0005513622
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
Tech. Rep. CSD-00-013, Department of Computer Sciences, Purdue University
-
K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack", Tech. Rep. CSD-00-013, Department of Computer Sciences, Purdue University, 2000.
-
(2000)
-
-
Park, K.1
Lee, H.2
-
16
-
-
0042308614
-
-
Belenky and Ansari, On IP Traceback. IEEE Communications Magazine, 41, Issue 7, July 2003.
-
Belenky and Ansari, "On IP Traceback. IEEE Communications Magazine", Volume 41, Issue 7, July 2003.
-
-
-
-
18
-
-
0036947597
-
Singlepacket IP traceback
-
Dec
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, B. Schwartz, S. Kent, and W. Strayer, "Singlepacket IP traceback". ACM/IEEE Transactions on Networking, Dec. 2002.
-
(2002)
ACM/IEEE Transactions on Networking
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.7
Strayer, W.8
-
20
-
-
38049148364
-
Efficient and Secure Source Authentication with Packet Passports
-
San Jose, CA, July
-
X. Liu, X.W. Yang, D. Wetherall, and T. Anderson, "Efficient and Secure Source Authentication with Packet Passports", 2nd USENIX Steps to Reduce Unwanted Traffic on the Internet workshop (SRUTI 2006), pp7-13, San Jose, CA, July 2006.
-
(2006)
2nd USENIX Steps to Reduce Unwanted Traffic on the Internet workshop (SRUTI
, pp. 7-13
-
-
Liu, X.1
Yang, X.W.2
Wetherall, D.3
Anderson, T.4
-
22
-
-
38049121449
-
The Automatic Peer-to-Peer Anti-Spoofing Method
-
Y. Shen, J. Bi, J.P. Wu, Q. Liu, "The Automatic Peer-to-Peer Anti-Spoofing Method", Lecture Notes in Artificial Intelligence, Vol. 4692, pp855-863, 2007.
-
(2007)
Lecture Notes in Artificial Intelligence
, vol.4692
, pp. 855-863
-
-
Shen, Y.1
Bi, J.2
Wu, J.P.3
Liu, Q.4
-
24
-
-
0031599142
-
-
Matsumoto and Nishimura, Mersenne twister: A 623-dimensionally equi distributed uniform pseudo-random number generator, ACM Trans. Model. Comput. Simul. 8, No. 1, 3-30, 1998.
-
Matsumoto and Nishimura, "Mersenne twister: A 623-dimensionally equi distributed uniform pseudo-random number generator", ACM Trans. Model. Comput. Simul. Vol. 8, No. 1, 3-30, 1998.
-
-
-
-
26
-
-
0042786512
-
Cryptography with chaos [J]
-
Baptista M.S. "Cryptography with chaos" [J]. Physics Letters A, 1998, 50-54.
-
(1998)
Physics Letters A
, pp. 50-54
-
-
Baptista, M.S.1
-
27
-
-
0003462010
-
Summary cache: A scalable wide-area web cache sharing protocol
-
Technical Report 1361, Department of Computer Science, University of Wisconsin-Madison
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. "Summary cache: A scalable wide-area web cache sharing protocol". Technical Report 1361, Department of Computer Science, University of Wisconsin-Madison, 1998.
-
(1998)
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
|