-
1
-
-
0036871268
-
Internet Infrastructure Security: A Taxonomy
-
A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," in Proc. Conf. IEEE Network, vol. 16, no.6, pp. 13-21, 2002.
-
(2002)
Proc. Conf. IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
2
-
-
4143130116
-
-
CERT Coordinate Center
-
CERT Coordinate Center, "Denial of Service Attacks," http://www.cert.org/tech-tips/denial-of-service.html.
-
Denial of Service Attacks
-
-
-
3
-
-
39049149034
-
International dropping: A novel scheme for syn flooding mitigation
-
April
-
B. Al-Duwairi and G. Manimaran,"International dropping: A novel scheme for syn flooding mitigation," in Proc. Conf. IEEE INFOCOM, April 2006.
-
(2006)
Proc. Conf. IEEE INFOCOM
-
-
Al-Duwairi, B.1
Manimaran, G.2
-
4
-
-
0010388228
-
Linux Kernal SYN Cookies Firewall Project
-
D. J. Bernstein and E. Schenk, "Linux Kernal SYN Cookies Firewall Project".
-
-
-
Bernstein, D.J.1
Schenk, E.2
-
5
-
-
3042859154
-
Resisting SYN Flooding DOS Attacks with SYN Cache
-
February
-
J. Lemon, "Resisting SYN Flooding DOS Attacks with SYN Cache," in Proc. Conf. USENIX BSD, February 2001.
-
(2001)
Proc. Conf. USENIX BSD
-
-
Lemon, J.1
-
6
-
-
0010053289
-
-
Check Point software Technologies Ltd
-
Check Point software Technologies Ltd. SynDefender: http://www. checkpoint.com/products/firewall-l.
-
SynDefender
-
-
-
11
-
-
0034206002
-
Summary cache: A scalable widearea Web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable widearea Web cache sharing protocol," IEEE/ACM Trans, on Networking, vol.8, no. 3, pp. 281-293, 2000.
-
(2000)
IEEE/ACM Trans, on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
12
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
S. Abdelsayed, D. Glimsholt, C. Leckie, S. Ryan, and S. Shami, "An efficient filter for denial-of-service bandwidth attacks," in Proc. Conf. IEEE GLOBECOM, vol.3, pp. 1353-1357, 2003.
-
(2003)
Proc. Conf. IEEE GLOBECOM
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
13
-
-
3543070612
-
IDR: An intrusion detection router for defending against distributed denial-of-service (DDoS) attacks
-
IS-PAN, pp
-
E. Chan, H. Chan, K. Chan, V. Chan, S. Chanson, and etc. "IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks," in Pro. Conf. IS-PAN, pp. 581586, 2004.
-
(2004)
Pro. Conf
, pp. 581586
-
-
Chan, E.1
Chan, H.2
Chan, K.3
Chan, V.4
Chanson, S.5
and etc6
-
14
-
-
58149085913
-
Defending Against TCP SYN Flooding Attacks Under Different Types of TP Spoofing
-
April
-
W. Chen and D. Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of TP Spoofing," in Proc. Conf. IEEE ICN, April 2006.
-
(2006)
Proc. Conf. IEEE ICN
-
-
Chen, W.1
Yeung, D.2
-
15
-
-
0001887844
-
Hash-based IP traceback
-
August
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer"Hash-based IP traceback," in Proc. Conf. ACM SIGCOMM, pp. 314, August 2001.
-
(2001)
Proc. Conf. ACM SIGCOMM
, pp. 314
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
16
-
-
70449120099
-
A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks
-
Poster
-
C. Sun, J. Fan, L. Shi, and B. Liu, "A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks," in Proc. Conf. IEEE INFOCOM (Poster), 2007.
-
(2007)
Proc. Conf. IEEE INFOCOM
-
-
Sun, C.1
Fan, J.2
Shi, L.3
Liu, B.4
|