-
1
-
-
8344224137
-
Low-rate targeted TCP denial-ofservice attacks (The shrew vs. the mice and elephants)
-
Karlsruhe, Germany, Aug
-
A. Kuzmanovic and E. Knightly, "Low-rate targeted TCP denial-ofservice attacks (The shrew vs. the mice and elephants)," in Proc. ACM SIGCOMM, Karlsruhe, Germany, Aug. 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.2
-
3
-
-
69249201931
-
-
S. Berinato, Online Extortion. [Online]. Available: http:// www.csoonline.com/read/050105/extortion.html
-
S. Berinato, Online Extortion. [Online]. Available: http:// www.csoonline.com/read/050105/extortion.html
-
-
-
-
5
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the internet in your spare time," in Proc. USENIX Security Symp., San Francisco, CA, Aug. 2002.
-
(2002)
Proc. USENIX Security Symp
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
8
-
-
84994527163
-
Using routing and tunneling to combat DDoS attacks
-
Cambridge, MA, Jul
-
A. Greenhalgh, M. Handley, and F. Huici, "Using routing and tunneling to combat DDoS attacks," in Proc. USENIX Workshop on Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI), Cambridge, MA, Jul. 2005.
-
(2005)
Proc. USENIX Workshop on Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI)
-
-
Greenhalgh, A.1
Handley, M.2
Huici, F.3
-
9
-
-
84886371697
-
-
Online, Available
-
Mazu Enforcer. [Online]. Available: http://www.mazunetworks.com/ products/mazu-enforcer.php
-
Mazu Enforcer
-
-
-
10
-
-
69249218561
-
-
Online, Available: \url{http
-
Peakflow X Data Sheet. [Online]. Available: \url{http://arbornetworks. com/downloads/Arbor_Peakflow_X_Data_Sheet.pdf
-
-
-
Data Sheet, P.X.1
-
12
-
-
69249220927
-
-
D. Bernstein, SYN Cookies. [Online]. Available: http://cr.yp.to/ syncookies.html
-
D. Bernstein, SYN Cookies. [Online]. Available: http://cr.yp.to/ syncookies.html
-
-
-
-
13
-
-
69249222175
-
Scalable defense against internet bandwidth-flooding attacks,
-
Ph.D. dissertation, Stanford Univ, Stanford, CA, Dec
-
K. Argyraki, "Scalable defense against internet bandwidth-flooding attacks," Ph.D. dissertation, Stanford Univ., Stanford, CA, Dec. 2006.
-
(2006)
-
-
Argyraki, K.1
-
15
-
-
84924375780
-
Botz4Sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA, May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz4Sale: Surviving organized DDoS attacks that mimic flash crowds," in Proc. USENIX Conf.Networked Systems Design and Implementation (NSDI , Boston, MA, May 2005.
-
(2005)
Proc. USENIX Conf.Networked Systems Design and Implementation (NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
16
-
-
33747017801
-
-
A. Markopoulou, F. Tobagi, and M. Karam, Loss and delay measurements of internet backbones, Elsevier Computer Commun., Special Issue on Measurements and Monitoring of IP Networks, 29, pp. 1590-1604, Jun. 2006.
-
A. Markopoulou, F. Tobagi, and M. Karam, "Loss and delay measurements of internet backbones," Elsevier Computer Commun., Special Issue on Measurements and Monitoring of IP Networks, vol. 29, pp. 1590-1604, Jun. 2006.
-
-
-
-
17
-
-
51349126234
-
Spatial-temporal characteristics of internet malicious sources
-
Phoenix, AZ, Apr
-
Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of internet malicious sources," in Proc. IEEE INFOCOM Mini-Conference Phoenix, AZ, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM Mini-Conference
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
19
-
-
0012315198
-
On inferring autonomous system relationships in the internet
-
San Francisco, CA, Nov
-
L. Gao, "On inferring autonomous system relationships in the internet," in Proc. Global Internet Symp., San Francisco, CA, Nov. 2000.
-
(2000)
Proc. Global Internet Symp
-
-
Gao, L.1
-
20
-
-
0011352799
-
SOS: Secure overlay services
-
Pittsburgh, PA, Aug
-
A. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure overlay services," in Proc. ACM SIGCOMM Conf., Pittsburgh, PA, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM Conf
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
22
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Jul
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Schenker, "Controlling high bandwidth aggregates in the network," ACM Comput. Commun. Rev., vol. 32, no. 3, pp. 62-73, Jul. 2002.
-
(2002)
ACM Comput. Commun. Rev
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Schenker, S.6
-
24
-
-
65249144934
-
Holding the internet accountable
-
Atlanta, GA, Nov
-
D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, "Holding the internet accountable," in Proc. ACM Workshop on Hot Topics in Networking (HotNets), Atlanta, GA, Nov. 2007.
-
(2007)
Proc. ACM Workshop on Hot Topics in Networking (HotNets)
-
-
Andersen, D.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
25
-
-
3543121457
-
Preventing internet denial-of-service with capabilities
-
Cambridge, MA, Nov
-
T. Anderson, T. Roscoe, and D. Wetherall, "Preventing internet denial-of-service with capabilities," in Proc. ACM Workshop on Hot Topics in Networking (HotNets), Cambridge, MA, Nov. 2003.
-
(2003)
Proc. ACM Workshop on Hot Topics in Networking (HotNets)
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
26
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
Oakland, CA, May
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
27
-
-
77951465538
-
Network capabilities: The good, the bad, and the ugly
-
College Park, MD, Nov
-
K. Argyraki and D. R. Cheriton, "Network capabilities: The good, the bad, and the ugly," in Proc. ACM Workshop on Hot Topics in Networking (HotNets), College Park, MD, Nov. 2005.
-
(2005)
Proc. ACM Workshop on Hot Topics in Networking (HotNets)
-
-
Argyraki, K.1
Cheriton, D.R.2
-
28
-
-
33749866400
-
A DoS-limiting architecture
-
Philadelphia, PA, Aug
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting architecture," in Proc. ACM SIGCOMM, Philadelphia, PA, Aug. 2005.
-
(2005)
Proc. ACM SIGCOMM
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
29
-
-
77954339088
-
Cookies along trust-boundaries (CAT): Accurate and deployable flood protection
-
San Jose, CA, Aug
-
M. Casado, A. Akella, P. Cao, N. Provos, and S. Shenker, "Cookies along trust-boundaries (CAT): Accurate and deployable flood protection," in Proc. USENIX Workshop on Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI), San Jose, CA, Aug. 2006.
-
(2006)
Proc. USENIX Workshop on Steps Towards Reducing Unwanted Traffic in the Internet (SRUTI)
-
-
Casado, M.1
Akella, A.2
Cao, P.3
Provos, N.4
Shenker, S.5
-
30
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
Kyoto, Japan, Aug
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu, "Portcullis: Protecting connection setup from denial-of-capability attacks," in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
31
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
Kyoto, Japan, Aug
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: Taking control of the enterprise," in Proc. ACMSIGCOMM, Kyoto, Japan, Aug. 2007.
-
(2007)
Proc. ACMSIGCOMM
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
|