-
1
-
-
6444230346
-
-
SP
-
"Arbor Networks Peakflow SP," http://www.arbornetworks.com/en/ peakflow-sp.html.
-
Arbor Networks Peakflow
-
-
-
3
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ann, M. Blum, N. Hopper, and J. Langforg, "CAPTCHA: Using hard AI problems for security," in Proc, Eurocrypt, 2003, pp. 294-311.
-
(2003)
Proc, Eurocrypt
, pp. 294-311
-
-
von Ann, L.1
Blum, M.2
Hopper, N.3
Langforg, J.4
-
4
-
-
84924375780
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds," in Proc. 2nd Symposium on Network Systems Design and Implementation (NSDI), Boston, MA, 2005.
-
(2005)
Proc. 2nd Symposium on Network Systems Design and Implementation (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
5
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rio de Janeiro, Brazil
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in Proc. 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, Brazil, 2006, pp. 41-52.
-
(2006)
Proc. 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
6
-
-
57849124841
-
-
February 2006
-
"The botnet trackers," http://www.washingtonpost.com/wp-dyn/ content/article/2006/02/16/AR20060%21601388.html, February 2006.
-
The botnet trackers
-
-
-
7
-
-
57849122783
-
-
M. Drewniak, Michigan man gets 30 months for conspiracy to order destructive computer attacks on business competitors, http://www.usdoj. gov/criminal/cybercrime/araboSent.htm, August 2006.
-
M. Drewniak, "Michigan man gets 30 months for conspiracy to order destructive computer attacks on business competitors," http://www.usdoj. gov/criminal/cybercrime/araboSent.htm, August 2006.
-
-
-
-
9
-
-
0002988210
-
Computing machinery and intelligence
-
A. Turing, "Computing machinery and intelligence," Mind, vol. 59, no. 236, pp. 433-460, 1950.
-
(1950)
Mind
, vol.59
, Issue.236
, pp. 433-460
-
-
Turing, A.1
-
11
-
-
57849148801
-
-
Breaking CAPTCHA without using ocr, a new technique, December 2007
-
"Breaking CAPTCHA without using ocr - a new technique," http://www.puremango.co.uk/cm-breaking-captcha-115.php, December 2007.
-
-
-
-
15
-
-
39149098302
-
Inaccessibility of CAPTCHA
-
World Wide Web Consortium W3C, Tech. Rep, November
-
M. May, "Inaccessibility of CAPTCHA," http://www.w3.org/TR/ turingtest/, World Wide Web Consortium (W3C), Tech. Rep., November 2005.
-
(2005)
-
-
May, M.1
-
18
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization and end-to-end protocol semantics," in Proc. 10th USENIX Security Symposium, 2001, p. 9.
-
(2001)
Proc. 10th USENIX Security Symposium
, pp. 9
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
19
-
-
0000904908
-
Fast pattern matching in strings
-
D. Knuth, J. H. Morris, and V. Pratt, "Fast pattern matching in strings," SIAM Journal on Computing, vol. 6, no. 2, pp. 323-350, 1973.
-
(1973)
SIAM Journal on Computing
, vol.6
, Issue.2
, pp. 323-350
-
-
Knuth, D.1
Morris, J.H.2
Pratt, V.3
-
20
-
-
0003415244
-
-
June 1999
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, "Hypertext Transfer Protocol - HTTP/1.1," http://www.w3.org/Protocols/rfc2616/rfc2616.html, June 1999.
-
Hypertext Transfer Protocol - HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
21
-
-
57849110140
-
-
"Ebtables," http://ebtables.sourceforge.net/.
-
-
-
-
22
-
-
0013194031
-
-
June 1999
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart, "HTTP authentication: Basic and digest acess authentication," http://www.ietf.org/rfc/rfc2617, June 1999.
-
HTTP authentication: Basic and digest acess authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
23
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proc. Network and Distributed Security Systems (NDSS), 1999, pp. 151-165.
-
(1999)
Proc. Network and Distributed Security Systems (NDSS)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
24
-
-
85009247912
-
A reverse Turing test using speech
-
Denver, CO, September
-
G. Kochanski, D. Lopresti, and C. Shih, "A reverse Turing test using speech," in Proc. 7th International Conference on Spoken Language Processing, Denver, CO, September 2002, pp. 1357-1360.
-
(2002)
Proc. 7th International Conference on Spoken Language Processing
, pp. 1357-1360
-
-
Kochanski, G.1
Lopresti, D.2
Shih, C.3
-
25
-
-
2342535718
-
ARTiFAClAL: Automated reverse turing test using facial features
-
November
-
Y. Rui and Z. Liu, "ARTiFAClAL: Automated reverse turing test using facial features," in Multimedia, November 2003.
-
(2003)
Multimedia
-
-
Rui, Y.1
Liu, Z.2
-
26
-
-
18744376590
-
Using graphic Turing tests to counter automated DDoS attacks against web servers
-
October
-
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Ruben-stein, "Using graphic Turing tests to counter automated DDoS attacks against web servers," in Proc. 10th ACM International Conference on Computer and Communications Security (CSS), October 2003, pp. 8-19.
-
(2003)
Proc. 10th ACM International Conference on Computer and Communications Security (CSS)
, pp. 8-19
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Ruben-stein, D.6
-
27
-
-
57849167346
-
DDoS defence by offense
-
Pisa, Italy, September
-
M. Walfish, M. Vutukuru, H. Balakrishnan, V. Karger, and S. Shenker, "DDoS defence by offense," in Proc. ACM Special Interest Group in Data Communications (SIGCOMM), Pisa, Italy, September 2006.
-
(2006)
Proc. ACM Special Interest Group in Data Communications (SIGCOMM)
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, V.4
Shenker, S.5
-
30
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet detection by monitoring group activities in DNS traffic," in Proc. 7th IEEE International Conference on Computer and Information Technology, 2007, pp. 715-720.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
31
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
A. Ramachandran, N. Fearnster, and D. Dagon, "Revealing botnet membership using DNSBL counter-intelligence," in Proc. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2006, pp. 49-54.
-
(2006)
Proc. 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
, pp. 49-54
-
-
Ramachandran, A.1
Fearnster, N.2
Dagon, D.3
-
33
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
November
-
C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer, "Using machine learning techniques to identify botnet traffic," in Proc. 2nd IEEE LCN Workshop on Network Security (WoNS), November 2006.
-
(2006)
Proc. 2nd IEEE LCN Workshop on Network Security (WoNS)
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
|