-
1
-
-
33749824252
-
ALPi: A DDoS defense system for high-speed networks
-
October
-
Ayres, P. E., Sun, H., Chao, H. Jonathan, Lau, W. C.: "ALPi: A DDoS defense system for high-speed networks"; IEEE Journal on Selected Areas in Com munications, 24, 10 (October 2006), 1864-1876.
-
(2006)
IEEE Journal on Selected Areas in Com munications
, vol.24
, Issue.10
, pp. 1864-1876
-
-
Ayres, P.E.1
Sun, H.2
Chao, H.3
Jonathan4
Lau, W.C.5
-
2
-
-
4143080368
-
Transient performance of packetScore for blocking DDoS attacks
-
ICC 2004-IEEE International Conference on Communications, June
-
Chuah, M. C., Lau, W. C., Kim, Y., Chao, H. Jonathan: "Transient performance of packetScore for blocking DDoS attacks"; ICC 2004-IEEE International Conference on Communications, 1 (June 2004), 1892-1896.
-
(2004)
, vol.1
, pp. 1892-1896
-
-
Chuah, M.C.1
Lau, W.C.2
Kim, Y.3
Chao, H.4
Jonathan5
-
3
-
-
39049149034
-
Intentional dropping: A novel scheme for SYN flooding mitigation
-
IEEE INFOCOM 2006-IEEE International Conference on Computer Communications, April
-
Duwairi, B. A., Manimaran, G.: "Intentional dropping: A novel scheme for SYN flooding mitigation"; IEEE INFOCOM 2006-IEEE International Conference on Computer Communications, 1 (April 2006), 3030-3034.
-
(2006)
, vol.1
, pp. 3030-3034
-
-
Duwairi, B.A.1
Manimaran, G.2
-
4
-
-
40949163757
-
Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests
-
November
-
Gao, Z., Ansari, N.: "Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests"; IEEE Communications Letters, 10,11 (November 2006), 793-795.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.11
, pp. 793-795
-
-
Gao, Z.1
Ansari, N.2
-
5
-
-
18144369239
-
DiDDeM: A system for early detection of TCP SYN flood attacks
-
Dec
-
Haggerty, J., Berry, T., Shi, Q., Merabti, M.: "DiDDeM: A system for early detection of TCP SYN flood attacks"; GLOBECOM 2004-IEEE Global Telecommunications Conference, 1 (Dec 2004), 5011-5011.
-
(2004)
GLOBECOM 2004-IEEE Global Telecommunications Conference
, vol.1
, pp. 5011-5011
-
-
Haggerty, J.1
Berry, T.2
Shi, Q.3
Merabti, M.4
-
6
-
-
4143081502
-
A covariance analysis model for DDoS attack detection
-
ICC 2004-IEEE International Conference on Communications, June
-
Jin. S., Yeung, D. S.: "A covariance analysis model for DDoS attack detection"; ICC 2004-IEEE International Conference on Communications, 1 (June 2004), 1882-1886.
-
(2004)
, vol.1
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.S.2
-
7
-
-
50949122256
-
Defending against meek DDoS attacks by IP traceback-based rate limiting
-
GLOBECOM 2006-IEEE Global Telecommunications Conference, November
-
Jing, Y., Wang, X., Xiao, X., Zhang, G.: "Defending against meek DDoS attacks by IP traceback-based rate limiting"; GLOBECOM 2006-IEEE Global Telecommunications Conference, 1 (November 2006), 1475-1479.
-
(2006)
, vol.1
, pp. 1475-1479
-
-
Jing, Y.1
Wang, X.2
Xiao, X.3
Zhang, G.4
-
8
-
-
0742269306
-
Vishal Misra and Dan Rubenstein SOS: An architecture for mitigating DDoS attacks
-
Jan
-
Keromytis, D.: "Vishal Misra and Dan Rubenstein SOS: An architecture for mitigating DDoS attacks"; IEEE Journal on Selected Areas in Communications, 22, 1 (Jan 2004), 176-188.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 176-188
-
-
Keromytis, D.1
-
9
-
-
0038052872
-
Random flow network modeling and simulations for DDoS attack mitigation
-
ICC 2003-IEEE International Conference on Communications, May
-
Kong, J., Mirza, M., Shu, J., Yoedhana, C., Gerla, M., Lu, S.: "Random flow network modeling and simulations for DDoS attack mitigation"; ICC 2003-IEEE International Conference on Communications, 1 (May 2003), 487-491.
-
(2003)
, vol.1
, pp. 487-491
-
-
Kong, J.1
Mirza, M.2
Shu, J.3
Yoedhana, C.4
Gerla, M.5
Lu, S.6
-
10
-
-
65349180833
-
A coordinated detection and response scheme for distributed denial-of-service attacks
-
ICC 2006-IEEE International Conference on Communications, June
-
Lam, H. Y., Li, C. P., Chanson, S. T., Yeung, D. Y.: "A coordinated detection and response scheme for distributed denial-of-service attacks"; ICC 2006-IEEE International Conference on Communications, 1 (June 2006), 2150-2155.
-
(2006)
, vol.1
, pp. 2150-2155
-
-
Lam, H.Y.1
Li, C.P.2
Chanson, S.T.3
Yeung, D.Y.4
-
11
-
-
25844492549
-
-
IEEE INFOCOM 2005-IEEE International Conference on Computer Communications, March
-
Li, Q., Chang, E. C., Chan, M. C.: "On the effectiveness of DDoS attacks on statistical filtering"; IEEE INFOCOM 2005-IEEE International Conference on Computer Communications, 1 (March 2005), 1373-1383.
-
(2005)
On the effectiveness of DDoS attacks on statistical filtering
, vol.1
, pp. 1373-1383
-
-
Li, Q.1
Chang, E.C.2
Chan, M.C.3
-
12
-
-
33745205813
-
Inferring Internet Denial-of-Service activity
-
May
-
Moore, D., Shannon, C., Brown, D. J., Voelker, G. M., Savage, S.: "Inferring Internet Denial-of-Service activity"; ACM Transactions on Computer Systems, 24, 2 (May 2006), 115-139.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
13
-
-
65349140674
-
-
GLOBECOM 2005-IEEE Global Telecommunications Conference, November
-
Muthuprasanna, M., Manimaran, G.: "Spacetime encoding scheme for DDoS attack traceback"; GLOBECOM 2005-IEEE Global Telecommunications Conference, 1 (November 2005), 457-461.
-
(2005)
Spacetime encoding scheme for DDoS attack traceback
, vol.1
, pp. 457-461
-
-
Muthuprasanna, M.1
Manimaran, G.2
-
14
-
-
58049164525
-
Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically
-
GLOBECOM 2004-IEEE Global Telecommunications Conference, Dec
-
Ohsita, Y., Ata, S., Murata, M.: "Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically"; GLOBECOM 2004-IEEE Global Telecommunications Conference, 1 (Dec 2004), 5012-5012.
-
(2004)
, vol.1
, pp. 5012-5012
-
-
Ohsita, Y.1
Ata, S.2
Murata, M.3
-
15
-
-
65349098812
-
Detecting DDoS attacks using a multilayer perception classifier
-
IM 2005-IFIP/IEEE International Symposium on Integrated Network Management, May
-
Siaterlis, C., Maglaris, B.: "Detecting DDoS attacks using a multilayer perception classifier"; IM 2005-IFIP/IEEE International Symposium on Integrated Network Management, 1 (May 2005), 1133-1136.
-
(2005)
, vol.1
, pp. 1133-1136
-
-
Siaterlis, C.1
Maglaris, B.2
-
16
-
-
77954646258
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
GLOBECOM 2004-IEEE Global Telecommunications Conference, Dec
-
Siris, V. A., Papagalou, F.: "Application of anomaly detection algorithms for detecting SYN flooding attacks"; GLOBECOM 2004-IEEE Global Telecommunications Conference, 1 (Dec 2004), 5013-5013.
-
(2004)
, vol.1
, pp. 5013-5013
-
-
Siris, V.A.1
Papagalou, F.2
-
17
-
-
58049147597
-
Counteracting TCP SYN DDoS attacks using automated model
-
GLOBECOM 2004-IEEE Global Telecommunications Conference, Dec
-
Tupakula, U. K., Varadharajan, V., Gajam, A. K.: "Counteracting TCP SYN DDoS attacks using automated model"; GLOBECOM 2004-IEEE Global Telecommunications Conference, 1 (Dec 2004), 5071-5071.
-
(2004)
, vol.1
, pp. 5071-5071
-
-
Tupakula, U.K.1
Varadharajan, V.2
Gajam, A.K.3
-
18
-
-
0036343692
-
Detecting SYN Flooding attacks
-
IEEE INFOCOM 2002-The Conference on Computer Communications, June
-
Wang, H., Zhang, D., Shin, K. G.: "Detecting SYN Flooding attacks"; IEEE INFOCOM 2002-The Conference on Computer Communications, 1 (June 2002), 1530-1539.
-
(2002)
, vol.1
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
19
-
-
65349135388
-
Mark-aided distributed filtering by using neural network for DDoS defense
-
GLOBECOM 2005-IEEE Global Telecommunications Conference, November
-
Xiang, Y., Zhou, W.: "Mark-aided distributed filtering by using neural network for DDoS defense"; GLOBECOM 2005-IEEE Global Telecommunications Conference, 1 (November 2005), 316-320.
-
(2005)
, vol.1
, pp. 316-320
-
-
Xiang, Y.1
Zhou, W.2
-
20
-
-
38549153397
-
Detecting flooding-based DDoS attacks
-
ICC 2007-IEEE International Conference on Communications, June
-
You, Y., Zulkernine, M., Haque, A.: "Detecting flooding-based DDoS attacks"; ICC 2007-IEEE International Conference on Communications, 1 (June 2007),1229-1234.
-
(2007)
, vol.1
, pp. 1229-1234
-
-
You, Y.1
Zulkernine, M.2
Haque, A.3
-
21
-
-
33749830235
-
Adaptive defense against various network attacks
-
October
-
Zou, C. C., Duffield, N., Towsley, D., Gong, W.: "Adaptive defense against various network attacks"; IEEE Journal on Selected Areas in Communications, 24, 10 (October 2006), 1877-1888.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1877-1888
-
-
Zou, C.C.1
Duffield, N.2
Towsley, D.3
Gong, W.4
|