-
1
-
-
33845591142
-
DDoS-resilient scheduling to counter application layer attacks under imperfect detection
-
presented at the, Barcelona, Spain, Apr
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-resilient scheduling to counter application layer attacks under imperfect detection," presented at the IEEE 1NFOCOM, Barcelona, Spain, Apr. 2006.
-
(2006)
IEEE 1NFOCOM
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
2
-
-
61449151636
-
-
Houston, TX, Oct. 2005 [Online, Available
-
S. Ranjan, "High performance DDoS-resilient web cluster architecture" Ph.D. Dissertation, Rice Univ., Houston, TX, Oct. 2005 [Online]. Available: http://www.ece.rice.edu/-sranjan
-
High performance DDoS-resilient web cluster architecture Ph.D. Dissertation, Rice Univ
-
-
Ranjan, S.1
-
5
-
-
61449143219
-
-
United States Vs Jay Echouafni et al. (Operation Cyber-slam) U.S. Dept. Justice [Online]. Available: www.usdoj.gov/criminal/fraud/docs/ reports/2004/websnare.pdf
-
United States Vs Jay Echouafni et al. (Operation Cyber-slam) U.S. Dept. Justice [Online]. Available: www.usdoj.gov/criminal/fraud/docs/ reports/2004/websnare.pdf
-
-
-
-
6
-
-
8344285705
-
Wide area redirection of dynamic content in Internet data centers
-
presented at the, Hong Kong
-
S. Ranjan, R. Karrer, and E. Knightly, "Wide area redirection of dynamic content in Internet data centers," presented at the IEEE INFOCOM, Hong Kong, 2004.
-
(2004)
IEEE INFOCOM
-
-
Ranjan, S.1
Karrer, R.2
Knightly, E.3
-
8
-
-
61449248808
-
-
Online, Available
-
Akamai. [Online]. Available: http://www.akamai.com
-
Akamai
-
-
-
9
-
-
84948416317
-
-
S. Ranjan, J. Rolia, H. Fu, and E. Knightly, QoS-driven server migration for Internet data centers, presented at the IWQoS, Miami Beach, FL, 2002.
-
S. Ranjan, J. Rolia, H. Fu, and E. Knightly, "QoS-driven server migration for Internet data centers," presented at the IWQoS, Miami Beach, FL, 2002.
-
-
-
-
10
-
-
85084163131
-
Scalable content-aware request distribution in cluster-based network servers
-
presented at the, San Diego, CA, Jun
-
M. Aron, D. Sanders, P. Druschel, and W. Zwaenepoel, "Scalable content-aware request distribution in cluster-based network servers," presented at the USENIX Annual Technical Conf., San Diego, CA, Jun. 2000.
-
(2000)
USENIX Annual Technical Conf
-
-
Aron, M.1
Sanders, D.2
Druschel, P.3
Zwaenepoel, W.4
-
11
-
-
85094648943
-
Conflict-aware scheduling for dynamic content applications
-
presented at the, Internet Technologies and Systems USITS, Seattle, WA, Mar
-
C. Amza, A. Cox, and W. Zwaenepoel, "Conflict-aware scheduling for dynamic content applications," presented at the 4th USENIX Symp. Internet Technologies and Systems (USITS), Seattle, WA, Mar. 2003.
-
(2003)
4th USENIX Symp
-
-
Amza, C.1
Cox, A.2
Zwaenepoel, W.3
-
12
-
-
0000635802
-
Integrating user-perceived quality into web server design
-
presented at the, Amsterdam
-
N. Bhatti, A. Bouch, and A. Kuchinsky, "Integrating user-perceived quality into web server design," presented at the World Wide Web Conf., Amsterdam, 2000.
-
(2000)
World Wide Web Conf
-
-
Bhatti, N.1
Bouch, A.2
Kuchinsky, A.3
-
14
-
-
34250115918
-
An examination of procedures for determining the number of clusters in a data set
-
G. W. Milligan and M. C. Cooper, "An examination of procedures for determining the number of clusters in a data set," Pyschometrika, vol. 50, pp. 159-179, 1985.
-
(1985)
Pyschometrika
, vol.50
, pp. 159-179
-
-
Milligan, G.W.1
Cooper, M.C.2
-
16
-
-
0032183789
-
The method of types
-
I. Csiszar, "The method of types," IEEE Trans. Inf. Theory, vol. 44, pp. 2505-2523, 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 2505-2523
-
-
Csiszar, I.1
-
17
-
-
84924375780
-
-
S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds, presented at the NSDI, Boston, MA, 2005.
-
S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, "Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds," presented at the NSDI, Boston, MA, 2005.
-
-
-
-
18
-
-
8344261545
-
PacketScore: Statistics-based overload control against distributed denial-of-service attacks
-
presented at the, Hong Kong
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "PacketScore: Statistics-based overload control against distributed denial-of-service attacks," presented at the IEEE INFOCOM, Hong Kong, 2004.
-
(2004)
IEEE INFOCOM
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
19
-
-
33645778005
-
-
Online, Available
-
Mazu Profiler. [Online]. Available: http://www.mazunetworks.com
-
Mazu Profiler
-
-
-
21
-
-
61449157031
-
-
L. Ricciulli, P. Lincoln, and P. Kakkar, TCP SYN flooding defense, presented at the CNDS, San Francisco, CA, 1999.
-
L. Ricciulli, P. Lincoln, and P. Kakkar, "TCP SYN flooding defense," presented at the CNDS, San Francisco, CA, 1999.
-
-
-
-
22
-
-
39049161433
-
Identification of repeated denial of service attacks
-
presented at the, Barcelona, Spain
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "Identification of repeated denial of service attacks," presented at the IEEE INFOCOM, Barcelona, Spain, 2006.
-
(2006)
IEEE INFOCOM
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
23
-
-
33645792808
-
Profiling Internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet backbone traffic: Behavior models and applications," Proc. ACM SIGCOMM, 2005.
-
(2005)
Proc. ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
24
-
-
61449193918
-
-
A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, presented at the ACMSIGCOMM, Philadelphia, PA, 2005.
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," presented at the ACMSIGCOMM, Philadelphia, PA, 2005.
-
-
-
-
26
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, pp. 2435-2463, Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
27
-
-
77953077374
-
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites, presented at theWorldWideWeb Conf., Honolulu, HI, May 2002.
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites," presented at theWorldWideWeb Conf., Honolulu, HI, May 2002.
-
-
-
-
28
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
presented at the, Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," presented at the IEEE Symp. Security and Privacy, Oakland, CA, May 2004.
-
(2004)
IEEE Symp. Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
30
-
-
0041431049
-
Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA
-
G. Mori and J. Malik, "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA," IEEE Comput. Vision Pattern Recognit. vol. 1, pp. 134-141, 2003.
-
(2003)
IEEE Comput. Vision Pattern Recognit
, vol.1
, pp. 134-141
-
-
Mori, G.1
Malik, J.2
-
31
-
-
61449203507
-
-
A. Garg and A. L. N. Reddy, Mitigating denial of service attacks using QoS regulation, presented at the IWQoS, Miami Beach, FL, May 2002.
-
A. Garg and A. L. N. Reddy, "Mitigating denial of service attacks using QoS regulation," presented at the IWQoS, Miami Beach, FL, May 2002.
-
-
-
-
32
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
presented at the, Hong Kong
-
F. Kargl, J. Maier, and M. Weber, "Protecting web servers from distributed denial of service attacks," presented at the World Wide Web Conf., Hong Kong, 2001.
-
(2001)
World Wide Web Conf
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
33
-
-
85050149881
-
Active Internet traffic filtering: Real-time response to denial-of-service attacks
-
presented at the, Anaheim, CA, Apr
-
K. Argyraki and D. Cheriton, "Active Internet traffic filtering: Real-time response to denial-of-service attacks," presented at the USENIX Annual Techical Conf., Anaheim, CA, Apr. 2005.
-
(2005)
USENIX Annual Techical Conf
-
-
Argyraki, K.1
Cheriton, D.2
-
34
-
-
3543121457
-
Preventing Internet denial-of-service with capabilities
-
presented at the, HotNets-II, Cambridge, MA, Nov
-
T. Anderson, T. Roscoe, and D. Wetherall, "Preventing Internet denial-of-service with capabilities," presented at the 2nd Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, Nov. 2003.
-
(2003)
2nd Workshop on Hot Topics in Networks
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
35
-
-
47749130236
-
DDoS defense by offense
-
presented at the, Pisa, Italy, Sep
-
M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker, "DDoS defense by offense," presented at the ACM SIGCOMM, Pisa, Italy, Sep. 2006.
-
(2006)
ACM SIGCOMM
-
-
Walfish, M.1
Balakrishnan, H.2
Karger, D.3
Shenker, S.4
|