-
2
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems, " ACM Computing Surveys, vol. 39, no. 1, 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
3
-
-
70449084846
-
Internet traffic trends - A view from 67 ISPs
-
[Online]. Available
-
C. Labovitz, D. McPherson, S. Iekel-Johnson, and M. Hollyman, "Internet Traffic Trends - A View from 67 ISPs, " NANOG, 2008. [Online]. Available: http://www.nanog.org/meetings/nanog43/presentations/ LabovitzinternetstatsN43.pdf.
-
(2008)
NANOG
-
-
Labovitz, C.1
Mcpherson, D.2
Iekel-Johnson, S.3
Hollyman, M.4
-
4
-
-
3042859154
-
Resisting SYN flood DoS attacks with a SYN cache
-
J. Lemon, "Resisting SYN flood DoS attacks with a SYN cache, " in USENIX BSDCon, 2002.
-
(2002)
USENIX BSDCon
-
-
Lemon, J.1
-
5
-
-
14944374775
-
-
[Online]. Available
-
"SYN cookies." [Online]. Available: http://cr.yp.to/syncookies. html.
-
SYN Cookies
-
-
-
6
-
-
70349695903
-
Tcp syn flooding attacks and common mitigations
-
[Online]. Available
-
W. Eddy, "TCP SYN flooding attacks and common mitigations, " RFC 4987, 2007. [Online]. Available: http://www.rfc-editor.org/rfc/rfc4987.txt.
-
(2007)
RFC 4987
-
-
Eddy, W.1
-
8
-
-
70449123775
-
Syn-dog: Sniffing SYN flooding sources
-
-, "SYN-dog: sniffing SYN flooding sources, " in IEEE ICDCS, 2002.
-
(2002)
IEEE ICDCS
-
-
-
10
-
-
43949089487
-
A robust scheme to detect SYN flooding attacks
-
Shanghai, China, August 22-24
-
C. Sun, J. Fan, and B. Liu, "A robust scheme to detect SYN flooding attacks, " in International Conference on Communications and Networking in China (ChinaCom), Shanghai, China, August 22-24 2007.
-
(2007)
International Conference on Communications and Networking in China (ChinaCom)
-
-
Sun, C.1
Fan, J.2
Liu, B.3
-
11
-
-
70449120099
-
A novel router-based scheme to mitigate SYN flooding DDoS attacks
-
Anchorage, Alaska, USA, May
-
C. Sun, J. Fan, L. Shi, and B. Liu, "A novel router-based scheme to mitigate SYN flooding DDoS attacks, " in IEEE INFOCOM (Student Poster), Anchorage, Alaska, USA, May 2007.
-
(2007)
IEEE INFOCOM (Student Poster)
-
-
Sun, C.1
Fan, J.2
Shi, L.3
Liu, B.4
-
12
-
-
33947507304
-
On scalable attack detection in the network
-
R. R. Kompella, S. Singh, and G. Varghese, "On scalable attack detection in the network, " IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 14-25, 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 14-25
-
-
Kompella, R.R.1
Singh, S.2
Varghese, G.3
-
13
-
-
70349673966
-
A more accurate scheme to detect SYN flood attacks
-
Rio de Janeiro, Brazil, Apr. 20
-
C. Sun, C. Hu, Y. Zhou, X. Xiao, and B. Liu, "A more accurate scheme to detect SYN flood attacks, " in IEEE INFOCOM Student Workshop, Rio de Janeiro, Brazil, Apr. 20 2009.
-
(2009)
IEEE INFOCOM Student Workshop
-
-
Sun, C.1
Hu, C.2
Zhou, Y.3
Xiao, X.4
Liu, B.5
-
14
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder and M. Mitzenmacher, "Network applications of Bloom filters: a survey, " Internet Mathematics, vol. 1, no. 4, pp. 485-509, 2004.
-
(2004)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
15
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
V. Thing, M. Sloman, and N. Dulay, "A survey of Bots used for distributed denial of service attacks, " IFIP International Information Security Conference, vol. 232, p. 229, 2007.
-
(2007)
IFIP International Information Security Conference
, vol.232
, pp. 229
-
-
Thing, V.1
Sloman, M.2
Dulay, N.3
-
16
-
-
0037717696
-
Passive estimation of TCP round-trip times
-
H. Jiang and C. Dovrolis, "Passive estimation of TCP round-trip times, " ACM SIGCOMM Comput. Commun. Rev., vol. 32, no. 3, pp. 75-88, 2002.
-
(2002)
ACM SIGCOMM Comput. Commun. Rev.
, vol.32
, Issue.3
, pp. 75-88
-
-
Jiang, H.1
Dovrolis, C.2
-
18
-
-
70349675245
-
-
[Online]. Available
-
"equinix-chicago monitor Realtime reports, " 2008. [Online]. Available: http://www.caida.org/data/passive/monitors/equinix-chicago.xml.
-
(2008)
Equinix-chicago Monitor Realtime Reports
-
-
-
20
-
-
33845584959
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable wide-area web cache sharing protocol, " in ACM SIGCOMM, 1998.
-
(1998)
ACM SIGCOMM
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
21
-
-
0031366315
-
Efficient hardware hashing functions for high performance computers
-
M. V. Ramakrishna, E. Fu, and E. Bahcekapili, "Efficient hardware hashing functions for high performance computers, " IEEE Transactions on Computers, vol. 46, no. 12, pp. 1378-1381, 1997.
-
(1997)
IEEE Transactions on Computers
, vol.46
, Issue.12
, pp. 1378-1381
-
-
Ramakrishna, M.V.1
Fu, E.2
Bahcekapili, E.3
-
22
-
-
84869463698
-
Ddos benchmarks and experimenter's workbench for the deter testbed
-
J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov, and P. Reiher, "DDoS benchmarks and experimenter's workbench for the DETER testbed, " in 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities(Tridentcom), 2007.
-
(2007)
3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities(Tridentcom)
-
-
Mirkovic, J.1
Wei, S.2
Hussain, A.3
Wilson, B.4
Thomas, R.5
Schwab, S.6
Fahmy, S.7
Chertov, R.8
Reiher, P.9
-
23
-
-
70449120098
-
Auckland-viii trace data
-
[Online]. Available
-
"Auckland-VIII trace data, " NLANR Project, 2003. [Online]. Available: http://pma.nlanr.net/Special/auck8.html.
-
(2003)
NLANR Project
-
-
|