-
1
-
-
33847143715
-
-
CAIDA
-
CAIDA, "Nameserver DoS Attack," http://www.caida.org/ projects/dns-analysis/ oct02dos.xml, 2002.
-
(2002)
Nameserver DoS Attack
-
-
-
2
-
-
64949203941
-
-
CCCA CA-2003-04, MS-SQL Server Worm, http:// www.cert.org/advisories/CA-2003-04.html, 2003.
-
CCCA CA-2003-04, "MS-SQL Server Worm", http:// www.cert.org/advisories/CA-2003-04.html, 2003.
-
-
-
-
3
-
-
2442597231
-
Roaming Honeypots for Mitigating Service-level Denial-of-Service Attacks
-
S. M. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati, "Roaming Honeypots for Mitigating Service-level Denial-of-Service Attacks," In ICDCS, 2004.
-
ICDCS, 2004
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Mosse, D.3
Melhem, R.4
Znati, T.5
-
4
-
-
11144272176
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
April
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Review, Vol. 34, No. 2 pp. 39-53, April 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
6
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," In IEEE INFOCOM, pp. 338-347, 2001.
-
(2001)
IEEE INFOCOM
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
7
-
-
0004194675
-
-
October
-
S. M. Bellovin, M. Leech, and T. Taylor, "ICMP Traceback Messages, In draft-ietf-itrace-01.txt, internet-draft," October 2001.
-
(2001)
ICMP Traceback Messages, In draft-ietf-itrace-01.txt, internet-draft
-
-
Bellovin, S.M.1
Leech, M.2
Taylor, T.3
-
8
-
-
3543059601
-
StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks,
-
Technical Report CMU-CS-02-208, December
-
A. Perrig, D. Song, and A. Yaar, "StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks," Technical Report CMU-CS-02-208, December 2002.
-
(2002)
-
-
Perrig, A.1
Song, D.2
Yaar, A.3
-
9
-
-
0003334329
-
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
-
May
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," In RFC 2827, May 2001.
-
(2001)
RFC 2827
-
-
Ferguson, P.1
Senie, D.2
-
10
-
-
0001647024
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," In ACM SIGCOMM, 2000.
-
ACM SIGCOMM, 2000
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
11
-
-
0034997397
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
D. X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," In IEEE INFOCOM, 2001.
-
(2001)
IEEE INFOCOM
-
-
Song, D.X.1
Perrig, A.2
-
12
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
ACM Press
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker,. "Controlling high bandwidth aggregates in the network," In ACM SIGCOMM Computer Communication Review, Vol. 32, pp. 62-73. ACM Press, 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
13
-
-
64949124700
-
-
T. H. Project, Know Your Enemy, Addison-Wisley, Indianapolis, IN, 2002.
-
T. H. Project, "Know Your Enemy," Addison-Wisley, Indianapolis, IN, 2002.
-
-
-
-
15
-
-
14844334596
-
Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles
-
X. Wang and M. Reiter, "Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles," In ACM CCS 2004.
-
ACM CCS 2004
-
-
Wang, X.1
Reiter, M.2
-
16
-
-
0038404196
-
Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles
-
D. K. Y. Yau, J. C. S. Lui, and F. Liang, "Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles," In IWQoS, 2002.
-
(2002)
IWQoS
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
-
17
-
-
85025403958
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin, and A. Stubblefield, "An algebraic approach to IP traceback," ACM Trans. Inf. Syst. Secur.,5(2):119-137, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
18
-
-
0001987976
-
IP Mobility Support
-
October
-
C. Perkins, "IP Mobility Support," In RFC 2002, October 1996.
-
(1996)
RFC 2002
-
-
Perkins, C.1
-
20
-
-
0034775309
-
Hash-based IP traceback
-
A. C. Snoeren, "Hash-based IP traceback," In ACM SIGCOMM, pp. 3-14, 2001.
-
(2001)
ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
-
21
-
-
84893960790
-
Proactive Server Roaming for Mitigating Denial of Service Attacks
-
S. M. Khattab, C. Sangpachatanaruk, R. Melhem, D. Mosse, and T. Znati, "Proactive Server Roaming for Mitigating Denial of Service Attacks," In ITRE, 2003.
-
ITRE, 2003
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Melhem, R.3
Mosse, D.4
Znati, T.5
-
22
-
-
64949170331
-
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
-
C. Sangpachatanaruk, S. M. Khattab, T. Znati, R. Melhem, and D. Mosse, "A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks," In ANSS, 2003.
-
ANSS, 2003
-
-
Sangpachatanaruk, C.1
Khattab, S.M.2
Znati, T.3
Melhem, R.4
Mosse, D.5
|