-
1
-
-
55849114307
-
-
Arbor Networks. Worldwide Infrastructure Security Report. http://www.arbornetworks.com/report, Sept. 2007.
-
Arbor Networks. Worldwide Infrastructure Security Report. http://www.arbornetworks.com/report, Sept. 2007.
-
-
-
-
2
-
-
31544436627
-
Denial-of-Service Attack-Detection Techniques
-
Jan
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai. Denial-of-Service Attack-Detection Techniques. IEEE Internet Computing, 10(1):82-89, Jan. 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
3
-
-
1242321281
-
DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art
-
Apr
-
C. Douligeris and A. Mitrokotsa. DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 44(5):643-666, Apr. 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
7
-
-
33750264130
-
An extensible and flexible System for Network Anomaly Detection
-
Sept
-
T. Gamer, M. Schöller, and R. Bless. An extensible and flexible System for Network Anomaly Detection. In Proc. of Autonomic Networking, pages 97-108, Sept. 2006.
-
(2006)
Proc. of Autonomic Networking
, pp. 97-108
-
-
Gamer, T.1
Schöller, M.2
Bless, R.3
-
8
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
June
-
R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: A peer-to-peer approach to network intrusion detection and prevention. In Proc. of IEEE WETICE, pages 226-231, June 2003.
-
(2003)
Proc. of IEEE WETICE
, pp. 226-231
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
9
-
-
33750226062
-
Simulation of Internet DDoS Attacks and Defense
-
Oct
-
I. V. Kotenko and A. Ulanov. Simulation of Internet DDoS Attacks and Defense. In Proc. of ISC, pages 327-342, Oct. 2006.
-
(2006)
Proc. of ISC
, pp. 327-342
-
-
Kotenko, I.V.1
Ulanov, A.2
-
10
-
-
33847290520
-
Mining Anomalies using Traffic Feature Distributions
-
Oct
-
A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies using Traffic Feature Distributions. ACM SIGCOMM Computer Communication Review, 35(4):217-228, Oct. 2005.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
13
-
-
78650720508
-
The Need for Simulation in Evaluating Anomaly Detectors
-
Jan
-
H. Ringberg, M. Roughan, and J. Rexford. The Need for Simulation in Evaluating Anomaly Detectors. SIGCOMM Computer Communication Review, 38(l):55-59, Jan. 2008.
-
(2008)
SIGCOMM Computer Communication Review
, vol.38
, Issue.L
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
14
-
-
52249112362
-
-
M. Roesch. Snort, http://www.snort.org, 2001.
-
(2001)
Snort
-
-
Roesch, M.1
-
15
-
-
84964506507
-
Cooperative Intrusion Traceback and Response Architecture (CITRA)
-
June
-
D. Schnackengerg, H. Holliday, R. Smith, K. Djahandari, and D. Sterne. Cooperative Intrusion Traceback and Response Architecture (CITRA). In Proc. of DARPA Information Survivability Conference & Exposition II, pages 56-68, June 2001.
-
(2001)
Proc. of DARPA Information Survivability Conference & Exposition II
, pp. 56-68
-
-
Schnackengerg, D.1
Holliday, H.2
Smith, R.3
Djahandari, K.4
Sterne, D.5
-
17
-
-
79955747674
-
LADS: Large-scale Automated DDoS detection System
-
June
-
V. Sekar. LADS: Large-scale Automated DDoS detection System. In Proc. of USENIX Technical Conference, pages 171-184, June 2005.
-
(2005)
Proc. of USENIX Technical Conference
, pp. 171-184
-
-
Sekar, V.1
-
21
-
-
24344440873
-
Statistically Countering Denial of Service Attacks
-
May
-
Y. Xu. Statistically Countering Denial of Service Attacks. In Proc. of IEEE International Conference on Communications, volume 2, pages 844-849, May 2005.
-
(2005)
Proc. of IEEE International Conference on Communications
, vol.2
, pp. 844-849
-
-
Xu, Y.1
-
23
-
-
28044469549
-
The Monitoring and Early Detection of Internet Worms
-
Oct
-
C. C. Zou. The Monitoring and Early Detection of Internet Worms. IEEE/ACM Transactions on Networking, 13(5):961-974, Oct. 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
-
24
-
-
33845606519
-
Sampling and Filtering Techniques for IP Packet Selection
-
June, Work in Progress
-
T. Zseby, M. Molina, F. Raspall, N. G. Duffield, and S. Niccolini. Sampling and Filtering Techniques for IP Packet Selection. Internet Draft, June 2007. Work in Progress.
-
(2007)
Internet Draft
-
-
Zseby, T.1
Molina, M.2
Raspall, F.3
Duffield, N.G.4
Niccolini, S.5
|