-
1
-
-
34248397693
-
Primed: A community-of-interest-based DDoS mitigation system
-
September
-
P. Verkaik, O. Spatscheck, J. van der Merwe, and A. Snoeren, "Primed: A community-of-interest-based DDoS mitigation system," in SIGCOMM Workshop on Large Scale Attack Defense (LSAD), September 2006.
-
(2006)
SIGCOMM Workshop on Large Scale Attack Defense (LSAD)
-
-
Verkaik, P.1
Spatscheck, O.2
Van Der Merwe, J.3
Snoeren, A.4
-
2
-
-
0141762497
-
Properties and prediction of flow statistics from sampled packet streams
-
Marseille, France, Nov.
-
N. Duffield, C. Lund, and M. Thorup, "Properties and prediction of flow statistics from sampled packet streams," in Proc. ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002, pp. 159-171.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 159-171
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
3
-
-
34248389195
-
Analysis of communities of interest in data networks
-
Mar.
-
W. Aiello, C. Kalmanek, P. McDaniel, S. Sen, O. Spatscheck, and J. Van der Merwe, "Analysis of Communities of Interest in Data Networks," in Proc. PAM Workshop, Mar. 2005.
-
(2005)
Proc. PAM Workshop
-
-
Aiello, W.1
Kalmanek, C.2
McDaniel, P.3
Sen, S.4
Spatscheck, O.5
Van Der Merwe, J.6
-
4
-
-
85081774740
-
Enterprise security: A community of interest based approach
-
Feb.
-
P. McDaniel, S. Sen, O. Spatscheck, J. Van der Merwe, W. Aiello, and C. Kalmanek, "Enterprise security: A community of interest based approach," in Proc. NDSS, Feb. 2006.
-
(2006)
Proc. NDSS
-
-
McDaniel, P.1
Sen, S.2
Spatscheck, O.3
Van Der Merwe, J.4
Aiello, W.5
Kalmanek, C.6
-
5
-
-
70349693660
-
Dissemination of flow specification rules
-
August
-
P. Marques, N. Sheth, R. Raszuk, B. Greene, J. Mauch, and D. McPer-son, "Dissemination of flow specification rules," IETF Internet-Draft, August 2005.
-
(2005)
IETF Internet-Draft
-
-
Marques, P.1
Sheth, N.2
Raszuk, R.3
Greene, B.4
Mauch, J.5
McPer-son, D.6
-
6
-
-
0002346271
-
An architecture for differentiated services
-
December
-
S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, "An architecture for differentiated services," IETF RFC 2475, December 1998.
-
(1998)
IETF RFC 2475
-
-
Blake, S.1
Black, D.2
Carlson, M.3
Davies, E.4
Wang, Z.5
Weiss, W.6
-
7
-
-
4444377390
-
Evolution of the internet QoS and support for soft real-time applications
-
Jul.
-
M. A. El-Gendy, A. Bose, and K. G. Shin, "Evolution of the Internet QoS and support for soft real-time applications," Proceedings of the IEEE, vol. 91, no. 7, pp. 1086-1104, Jul. 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.7
, pp. 1086-1104
-
-
El-Gendy, M.A.1
Bose, A.2
Shin, K.G.3
-
8
-
-
0032678509
-
Internet QoS: A big picture
-
Mar./Apr.
-
X. Xipeng and L. M. Ni, "Internet QoS: A big picture," IEEE Network, vol. 13, no. 2, pp. 8-18, Mar./Apr. 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.2
, pp. 8-18
-
-
Xipeng, X.1
Ni, L.M.2
-
11
-
-
24344504658
-
Communities of interest
-
C. Cortes, D. Pregibon, and C. T. Volinsky, "Communities of interest," Intelligent Data Analysis, vol. 6, no. 3, pp. 211-219, 2002.
-
(2002)
Intelligent Data Analysis
, vol.6
, Issue.3
, pp. 211-219
-
-
Cortes, C.1
Pregibon, D.2
Volinsky, C.T.3
-
14
-
-
84954422497
-
Pi: A path identification mechanism to defend against DDoS attacks
-
Oakland, CA
-
A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, 2003.
-
(2003)
Proc. IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
15
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
Oakland, CA, May
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks," in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proc. IEEE Symposium on Security and Privacy
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
16
-
-
11144272176
-
A taxonomy of DDoS attacks and defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attacks and defense mechanisms," ACM Computer Communications Review, vol. 34, no. 2, pp. 39-54, 2004.
-
(2004)
ACM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
17
-
-
36048986923
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
Boston, MA, May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds," in Proc. 2nd USENIX NSDI, Boston, MA, May 2005.
-
(2005)
Proc. 2nd USENIX NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
18
-
-
36349011617
-
DDoS defense by offense
-
Pisa, Italy, Aug.
-
M. Walfish, H. Balakrishnan, D. Karger, and S. Shenker, "DDoS defense by offense," in Proc. ACM SIGCOMM, Pisa, Italy, Aug. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Walfish, M.1
Balakrishnan, H.2
Karger, D.3
Shenker, S.4
-
19
-
-
84891624492
-
Off by default!
-
Nov.
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker, "Off by default!" in Proc. ACM HotNets Workshop, Nov. 2005.
-
(2005)
Proc. ACM HotNets Workshop
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
20
-
-
70349661427
-
Minimizing collateral damage by proactive surge protection
-
August
-
J. Chou, B. Lin, S. Sen, and O. Spatscheck, "Minimizing collateral damage by proactive surge protection," in SIGCOMM Workshop on Large Scale Attack Defense (LSAD), August 2007.
-
(2007)
SIGCOMM Workshop on Large Scale Attack Defense (LSAD)
-
-
Chou, J.1
Lin, B.2
Sen, S.3
Spatscheck, O.4
-
22
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
T. M. Gil and M. Poletto, "MULTOPS: a data-structure for bandwidth attack detection," in USENIX Security Symposium, 2001.
-
(2001)
USENIX Security Symposium
-
-
Gil, T.M.1
Poletto, M.2
-
23
-
-
34248379606
-
Analyzing large ddos attacks using multiple data sources
-
September
-
Z. M. Mao, V. Sekar, O. Spatscheck, J. van der Merwe, and R. Va-sudevan, "Analyzing large ddos attacks using multiple data sources," in SIGCOMM Workshop on Large Scale Attack Defense (LSAD), September 2006.
-
(2006)
SIGCOMM Workshop on Large Scale Attack Defense (LSAD)
-
-
Mao, Z.M.1
Sekar, V.2
Spatscheck, O.3
Van Der Merwe, J.4
Va-sudevan, R.5
-
24
-
-
1142267334
-
Gigascope: A stream database for network applications
-
C. Cranor, T. Johnson, O. Spatscheck, and V. Shkapenyuk, "Gigascope: a stream database for network applications," in ACM SIGMOD, 2003.
-
(2003)
ACM SIGMOD
-
-
Cranor, C.1
Johnson, T.2
Spatscheck, O.3
Shkapenyuk, V.4
|