-
1
-
-
66249117059
-
DDoS attacks on Yahoo, .ast;Buy.com, eBay, Amazon, Datek,. E Trade
-
CNN, DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek,. E Trade ", CNN Headline News, 2000.
-
(2000)
CNN Headline News
-
-
-
3
-
-
0008723266
-
Distributed denial of service trinOO
-
Lawrence Livermore National Laboratory, February 14
-
P.J. Criscuolo, Distributed Denial of Service TrinOO, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory (CIAC), UCRL-ID-136939, Rev. 1,Lawrence Livermore National Laboratory, February 14, 2000.
-
(2000)
Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory (CIAC), UCRL-ID-136939, Rev. 1
-
-
Criscuolo, P.J.1
-
8
-
-
85006413597
-
Analyzing distributed denial of service tools: The shaft case
-
New Orleans, LA, USA, December 3-8
-
S. Dietrich, N. Long, D. Dittrich, Analyzing Distributed Denial of Service tools: the Shaft Case, in: Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, LA, USA, December 3-8, 2000, pp. 329-339.
-
(2000)
In: Proceedings of the 14th Systems Administration Conference (LISA 2000)
, pp. 329-339
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
9
-
-
1242327641
-
Trinity v3, a DDoS tool, hits the streets
-
B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers Security 19 (7) (2000) 574.
-
(2000)
Computers Security
, vol.19
, Issue.7
, pp. 574
-
-
Hancock, B.1
-
10
-
-
34249058930
-
-
CERT Coordination Center, Carnegie Mellon Software Engineering Institute
-
CERT Coordination Center, Carnegie Mellon Software Engineering Institute, CERT Advisory CA-2001-2020 Continuing threats to home users, 23, 2001, Available from .
-
(2001)
CERT Advisory CA-2001- 20 Continuing Threats to Home Users
, vol.23
-
-
-
11
-
-
66249104798
-
-
Insecure.org. August, 8 April 2003
-
Nmap Stealth Port Scanner Introduction", Insecure.org. August 2002. http://www.insecure.org/nmap/. (8 April 2003).
-
(2002)
Nmap Stealth Port Scanner Introduction
-
-
-
12
-
-
0034775309
-
Hash-based IP traceback
-
Alex C. Snoeren, et al., Hash-Based IP Traceback", ACM Sigcomm, Aug. 2001, pp. 3-14.
-
(2001)
ACM Sigcomm
, pp. 3-14
-
-
Alex Snoeren, C.1
-
13
-
-
85180777711
-
An algebraic approach to IP traceback
-
Feb.
-
D. Dean, M. Franklin, and A. Stubblefield, An algebraic approach to IP Traceback", Network and Distributed System Security Symposium, Feb. 2001, pp. 3-12.
-
(2001)
Network and Distributed System Security Symposium
, pp. 3-12
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
14
-
-
0142250001
-
ICMP traceback with cumulative path, an efficient solution for IP traceback
-
Springer Lecture Notes in Computer Science, Sept.
-
Henry C. J. Lee, et al., ICMP Traceback with Cumulative Path, An Efficient Solution for IP Traceback", International Conference on Information and Communications Security, Springer Lecture Notes in Computer Science, Sept. 2003, pp. 124-135.
-
(2003)
International Conference on Information and Communications Security
, pp. 124-135
-
-
Henry Lee, C.J.1
-
15
-
-
0034997397
-
Advanced and authenticated marking scheme for IP traceback
-
Apr.
-
Dawn Song and Adrian Perrig, Advanced and authenticated marking scheme for IP traceback", IEEE INFOCOMM, Apr. 2001, pp. 878-886.
-
(2001)
IEEE INFOCOMM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
17
-
-
0142199483
-
Tracing multiple attackers with deterministic packet marking (DPM)
-
A. Belenky, and N. Ansari, Tracing Multiple Attackers with Deterministic Packet Marking (DPM)", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2003, pp.49-52.
-
(2003)
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, pp. 49-52
-
-
Belenky, A.1
Ansari, N.2
-
18
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
Apr.
-
K. Park and H. Lee, On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack", IEEE INFOCOMM, Apr. 2001, pp. 338-347.
-
(2001)
IEEE INFOCOMM
, pp. 338-347
-
-
Park, K.1
Lee, H.2
|