-
1
-
-
0036343692
-
Detecting SYN flooding attacks
-
New York, USA
-
H. Wang, D. Zhang, K.G. Shin, "Detecting SYN flooding attacks", Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society ( INFOCOM'02), New York, USA, 2002, pp. 1530-1539.
-
(2002)
Proceedings of the Annual Joint Conference of the IEEE Computer Society and Communications Society ( INFOCOM'02)
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
2
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
Washington, DC, USA
-
C. Jin, H.N. Wang, K.G. Shin, "Hop-count filtering: An effective defense against spoofed DDoS traffic", Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS'03). Washington, DC, USA, 2003, pp. 30-41.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS'03)
, pp. 30-41
-
-
Jin, C.1
Wang, H.N.2
Shin, K.G.3
-
3
-
-
3042859154
-
Resisting SYN flood DoS attacks with a SYN cache
-
San Francisco, CA, USA
-
J. Lemon, "Resisting SYN flood DoS attacks with a SYN cache", Proceedings of the BSDCon 2002, San Francisco, CA, USA, 2002, pp. 89-97.
-
(2002)
Proceedings of the BSDCon
, pp. 89-97
-
-
Lemon, J.1
-
4
-
-
0038729330
-
Protection from distributed denial of service attack using history-based IP filtering
-
Anchorage, Alaska, USA, May 11-15
-
T. Peng, C. Leckie, and R. Kotagiri, "Protection from distributed denial of service attack using history-based IP filtering", Proceedings of IEEE International Conference on Communications 2003(Anchorage, Alaska, USA, May 11-15 2003), pp. 482-486.
-
(2003)
Proceedings of IEEE International Conference on Communications
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
5
-
-
23944521338
-
An Active Detecting Method Against SYN Flooding Attack
-
Fukuoka, Japan,20-22 July
-
B. Xiao, W. Chen, Y.X. He, H.M. Edwin Sha, "An Active Detecting Method Against SYN Flooding Attack", Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05),( Fukuoka, Japan,20-22 July 2005), pp. 709-715.
-
(2005)
Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05)
, pp. 709-715
-
-
Xiao, B.1
Chen, W.2
He, Y.X.3
Edwin Sha, H.M.4
-
6
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France
-
J. Mirkovic and G. Prier, "Attacking DDoS at the source", Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 2002, pp. 312-321.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
-
7
-
-
0003553457
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
Internet best current practice RFC 2827, May
-
P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing", Internet best current practice RFC 2827, May 2000.
-
(2000)
-
-
Ferguson, P.1
Senie, D.2
-
8
-
-
0035438826
-
What can you do with Tracerouter?
-
S. Branigan, H. Burch, B. Cheswick, and F. Wojcik, "What can you do with Tracerouter?", IEEE Internet Computing, Vol.5, Issue 5, 2001, pp. 96.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.5
, pp. 96
-
-
Branigan, S.1
Burch, H.2
Cheswick, B.3
Wojcik, F.4
-
9
-
-
85180745018
-
Implementing pushback: Routerbased defense against DDoS attacks
-
San Diego, California, USA, 6-8 February, The Internet Society
-
J. Ioannidis and S.M. Bellovin, "Implementing pushback: Routerbased defense against DDoS attacks", Proceedings of the Network and Distributed System Security Symposium (NDSS'02), (San Diego, California, USA, 6-8 February 2002), The Internet Society, 2002.
-
(2002)
Proceedings of the Network and Distributed System Security Symposium (NDSS'02)
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
10
-
-
33744910842
-
A Novel Technique for Detecting DDoS Attacks at the Early Stage
-
B. Xiao, W. Chen, Y.X. He, "A Novel Technique for Detecting DDoS Attacks at the Early Stage", Journal of Supercomputing, Vol. 36, 2006, pp. 235-248.
-
(2006)
Journal of Supercomputing
, vol.36
, pp. 235-248
-
-
Xiao, B.1
Chen, W.2
He, Y.X.3
-
12
-
-
39749130411
-
-
B. Xiao, W. Chen, and Y.X. He, An Autonomous Defense against SYN Flooding Attacks: Detect and Throttle Attacks at the Victim Side, Journal of Parallel and Distributed Computing (JPDC - Elsevier), 68, Issue 4, 2008, pp. 456-470.
-
B. Xiao, W. Chen, and Y.X. He, "An Autonomous Defense against SYN Flooding Attacks: Detect and Throttle Attacks at the Victim Side", Journal of Parallel and Distributed Computing (JPDC - Elsevier), Vol. 68, Issue 4, 2008, pp. 456-470.
-
-
-
-
13
-
-
0036990601
-
Using transient behavior of TCP in mitigation of distributed denial of service attacks
-
10-13 Dec
-
M. Kalantari, K. Gallicchio, and M. Shayman, "Using transient behavior of TCP in mitigation of distributed denial of service attacks", Proceedings of the 41st IEEE Conference on Decision and Control, 10-13 Dec. 2002, pp. 1422-1427.
-
(2002)
Proceedings of the 41st IEEE Conference on Decision and Control
, pp. 1422-1427
-
-
Kalantari, M.1
Gallicchio, K.2
Shayman, M.3
-
14
-
-
0036375286
-
-
H. Wang, D. Zhang, and G. Shin, SYN-dog: sniffing SYN flooding source, Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), July 2002, pp. 421-429.
-
H. Wang, D. Zhang, and G. Shin, "SYN-dog: sniffing SYN flooding source", Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), July 2002, pp. 421-429.
-
-
-
-
16
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
Silver Spring, MD, IEEE Computer Society
-
A. Yaar, A. Perrig, D. Song, "SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks", Proceedings of the IEEE Symposium on Security and Privacy, (Silver Spring, MD, 2004), IEEE Computer Society, 2004, pp. 130-143.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|