-
1
-
-
29244475815
-
-
Prentice Hall PTR,December 30
-
Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher,Internet Denial of Service: Attack and Defense Mechanisms,Prentice Hall PTR,December 30, 2004,1-400
-
(2004)
Internet Denial of Service: Attack and Defense Mechanisms
, pp. 1-400
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
2
-
-
18144385431
-
-
Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE, 2004. 2050-2054.
-
Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE, 2004. 2050-2054.
-
-
-
-
3
-
-
0036700065
-
Design and implementation of distributed intrusion detection system NetNumen
-
[3]Li W, Wu LF, Hu GY. Design and implementation of distributed intrusion detection system NetNumen. Journal of Software, 2002,13(8):1723-1728
-
(2002)
Journal of Software
, vol.13
, Issue.8
, pp. 1723-1728
-
-
Li, W.1
Wu, L.F.2
Hu, G.Y.3
-
4
-
-
0142039750
-
IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
-
Sung M, Xu J. IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks. IEEE Trans. on Parallel and Distributed Systems, 2003, 14(9):861-872.
-
(2003)
IEEE Trans. on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 861-872
-
-
Sung, M.1
Xu, J.2
-
6
-
-
0036658381
-
Using adaptive router throttles against distributed denial-of-service attacks
-
Liang F, Yau D. Using adaptive router throttles against distributed denial-of-service attacks. Journal of Software, 2002,13(7): 1120-1127
-
(2002)
Journal of Software
, vol.13
, Issue.7
, pp. 1120-1127
-
-
Liang, F.1
Yau, D.2
-
7
-
-
0013347997
-
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics,
-
Technical Report 200 ICRD176, General Electric Research and Development Center, December
-
A. B Kulkarni, S. F. Bush, and S. C. Evans, "Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics," Technical Report 200 ICRD176, General Electric Research and Development Center, December 2001.
-
(2001)
-
-
Kulkarni, A.B.1
Bush, S.F.2
Evans, S.C.3
-
9
-
-
0042536226
-
Code-Red: A case study on the spread and victims of an Internet worm
-
IMW 2002
-
D. Moore, C. Shannon, J. Brown, Code-Red: a case study on the spread and victims of an Internet worm, in Proc. ACM IMW 2002.
-
Proc. ACM
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
10
-
-
33751424902
-
-
Yu Chen, Kai Hwang, Yu-Kwong Kwok, Filtering of Shrew DDoS Attacks in Frequency Domain, lcn, pp. 786-793, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)1, 2005
-
Yu Chen, Kai Hwang, Yu-Kwong Kwok, "Filtering of Shrew DDoS Attacks in Frequency Domain," lcn, pp. 786-793, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)1, 2005
-
-
-
-
11
-
-
17644411571
-
Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic
-
ACM Press, October
-
C. Jin, H. Wang, and K. G. Shin, "Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic," Proceedings of the 10th ACM Conference on Computer and Communication Security, ACM Press, October 2003, pp 30-41.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
12
-
-
0032670943
-
Web caching and zipf-like distributions: Evidence and implications
-
Choudhury AK, Shroff N, eds, Los Alamitos: IEEE Press
-
Breslau L, Cao P, Fan L, Phillips G, Shenker S. Web caching and zipf-like distributions: Evidence and implications. In: Choudhury AK, Shroff N, eds. Proc. of the IEEE INFOCOM'99. Los Alamitos: IEEE Press, 1999. 126-134.
-
(1999)
Proc. of the IEEE INFOCOM'99
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
|