-
1
-
-
11144272176
-
A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM Sigcomm Computer Comm. Rev., vol. 34, no.2, 2004, 39-53.
-
(2004)
ACM Sigcomm Computer Comm. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
2
-
-
48149114703
-
Lightweight Detection of DoS Attack
-
Adelaide, South Australia, November
-
S. Pukkawanna, V.Visoottiviseth, P.Pongpaibool, "Lightweight Detection of DoS Attack", In Proc. of IEEE ICON2007, Adelaide, South Australia, November 2007.
-
(2007)
Proc. of IEEE ICON2007
-
-
Pukkawanna, S.1
Visoottiviseth, V.2
Pongpaibool, P.3
-
4
-
-
62349103417
-
-
Snort, http://www.snort.org.
-
Snort
-
-
-
5
-
-
62349089896
-
-
Ntop, http://ntop.org.
-
Ntop
-
-
-
6
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy,
-
Technical Report 99-15, Department of Computer Engineering, Chalmers University, March
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
7
-
-
84901460824
-
A Network IDS with Low False Positive Rate
-
Evolutionary Computation
-
Yan Qial and Xie Weixin, "A Network IDS with Low False Positive Rate," In Proc. of the 2002 Congress on Evolutionary Computation, Vol.2, pp. 1121-1126, 2002.
-
(2002)
Proc. of the 2002 Congress on
, vol.2
, pp. 1121-1126
-
-
Yan, Q.1
Xie, W.2
-
8
-
-
14944383480
-
Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification
-
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, "Class-of- service mapping for QoS: A statistical signature-based approach to IP traffic classification," Internet Measurement Conference, 2004.
-
(2004)
Internet Measurement Conference
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
Duffield, N.4
-
9
-
-
33845251186
-
Flow clustering using machine learning techniques
-
A. McGregor, M. Hall, P. Lorier, and J. Brunskill, "Flow clustering using machine learning techniques," In Proc. of Passive and Active Measurement Workshop, 2004.
-
(2004)
Proc. of Passive and Active Measurement Workshop
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
11
-
-
14344265818
-
Internet traffic classification using Bayesian analysis
-
A. Moore and D. Zuew, "Internet traffic classification using Bayesian analysis," In Proc. of ACM SIGMETRICS, 2005.
-
(2005)
Proc. of ACM SIGMETRICS
-
-
Moore, A.1
Zuew, D.2
-
12
-
-
62349104487
-
-
Iperf, http://dast.nlanr.net/Projects/Iperf/
-
Iperf
-
-
-
13
-
-
62349101269
-
-
MAWI Working Group Traffic Archive
-
MAWI Working Group Traffic Archive, http://mawi.wide.ad.jp/mawi/.
-
-
-
-
14
-
-
62349131132
-
-
tcpreplay, http://tcpreplay.synfrn.net/trac/
-
tcpreplay, http://tcpreplay.synfrn.net/trac/
-
-
-
-
15
-
-
62349106930
-
-
Neptune, http://www.phrack.org/archives/48/P48-13.
-
Neptune
-
-
-
16
-
-
62349106931
-
-
nmap, http://insecure.org/nmap/.
-
nmap, http://insecure.org/nmap/.
-
-
-
-
17
-
-
62349105712
-
-
jping, http://www.tenebril.com/src/info.php?id=11777455.
-
jping, http://www.tenebril.com/src/info.php?id=11777455.
-
-
-
-
18
-
-
62349102181
-
-
udpflood.c, http://www.leetupload.com/dbindex2/index.php? dir=Misc/Exploit-Code-Archive/&sort=size&sort-mode=a
-
udpflood.c, http://www.leetupload.com/dbindex2/index.php? dir=Misc/Exploit-Code-Archive/&sort=size&sort-mode=a
-
-
-
-
19
-
-
62349122774
-
-
smurf.c, http://www.hackerzlair.org/software/c/.
-
smurf.c, http://www.hackerzlair.org/software/c/.
-
-
-
-
20
-
-
62349117268
-
-
Juniper Networks, Denial of Service and Attack Protection, Firewall/VPN Feature Brief, http://www.juniper.net/products/integrated/dos.pdf, June 2006.
-
Juniper Networks, "Denial of Service and Attack Protection," Firewall/VPN Feature Brief, http://www.juniper.net/products/integrated/dos.pdf, June 2006.
-
-
-
-
21
-
-
62349121576
-
-
sysstat, http://pagesperso-orange.fr/sebastien.godard/.
-
sysstat, http://pagesperso-orange.fr/sebastien.godard/.
-
-
-
-
23
-
-
62349094596
-
-
June 21, 2008
-
Arakis, "Port Description," http://www.arakis.pl/en/ports.html, June 21, 2008.
-
Port Description
-
-
-
24
-
-
62349116176
-
-
Perm Computing, W32.Sasser.Worm, http://www.upenn.edu/ computing/virus/04/w32.sasser.worm.html.
-
Perm Computing, "W32.Sasser.Worm," http://www.upenn.edu/ computing/virus/04/w32.sasser.worm.html.
-
-
-
|