메뉴 건너뛰기




Volumn , Issue , 2008, Pages 633-640

Sentinel: Hardware-accelerated mitigation of bot-based DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CRIME;

EID: 57849143337     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2008.ECP.123     Document Type: Conference Paper
Times cited : (5)

References (33)
  • 1
    • 6444230346 scopus 로고    scopus 로고
    • SP
    • "Arbor Networks Peakflow SP," http://www.arbornetworks.com/en/ peakflow-sp.html.
    • Arbor Networks Peakflow
  • 6
    • 57849124841 scopus 로고    scopus 로고
    • February 2006
    • "The botnet trackers," http://www.washingtonpost.com/wp-dyn/ content/article/2006/02/16/AR20060%21601388.html, February 2006.
    • The botnet trackers
  • 7
    • 57849122783 scopus 로고    scopus 로고
    • M. Drewniak, Michigan man gets 30 months for conspiracy to order destructive computer attacks on business competitors, http://www.usdoj. gov/criminal/cybercrime/araboSent.htm, August 2006.
    • M. Drewniak, "Michigan man gets 30 months for conspiracy to order destructive computer attacks on business competitors," http://www.usdoj. gov/criminal/cybercrime/araboSent.htm, August 2006.
  • 9
    • 0002988210 scopus 로고
    • Computing machinery and intelligence
    • A. Turing, "Computing machinery and intelligence," Mind, vol. 59, no. 236, pp. 433-460, 1950.
    • (1950) Mind , vol.59 , Issue.236 , pp. 433-460
    • Turing, A.1
  • 11
    • 57849148801 scopus 로고    scopus 로고
    • Breaking CAPTCHA without using ocr, a new technique, December 2007
    • "Breaking CAPTCHA without using ocr - a new technique," http://www.puremango.co.uk/cm-breaking-captcha-115.php, December 2007.
  • 15
    • 39149098302 scopus 로고    scopus 로고
    • Inaccessibility of CAPTCHA
    • World Wide Web Consortium W3C, Tech. Rep, November
    • M. May, "Inaccessibility of CAPTCHA," http://www.w3.org/TR/ turingtest/, World Wide Web Consortium (W3C), Tech. Rep., November 2005.
    • (2005)
    • May, M.1
  • 18
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization and end-to-end protocol semantics
    • M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization and end-to-end protocol semantics," in Proc. 10th USENIX Security Symposium, 2001, p. 9.
    • (2001) Proc. 10th USENIX Security Symposium , pp. 9
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 21
    • 57849110140 scopus 로고    scopus 로고
    • "Ebtables," http://ebtables.sourceforge.net/.
  • 23
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proc. Network and Distributed Security Systems (NDSS), 1999, pp. 151-165.
    • (1999) Proc. Network and Distributed Security Systems (NDSS) , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 25
    • 2342535718 scopus 로고    scopus 로고
    • ARTiFAClAL: Automated reverse turing test using facial features
    • November
    • Y. Rui and Z. Liu, "ARTiFAClAL: Automated reverse turing test using facial features," in Multimedia, November 2003.
    • (2003) Multimedia
    • Rui, Y.1    Liu, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.