-
2
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Belenky, A. and Ansari, N. (2003) ‘IP traceback with deterministic packet marking’, IEEE Communication Letters, Vol. 41, No.7, pp.162–164.
-
(2003)
IEEE Communication Letters
, vol.41
, Issue.7
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H. (1970) ‘Space/time trade-offs in hash coding with allowable errors’, Communications of ACM, Vol. 13, No. 7, pp.422–426.
-
(1970)
Communications of ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
December
-
Burch, H. and Cheswick, B. (2000) ‘Tracing anonymous packets to their approximate source’, Proceedings of the USENIX LISA, December.
-
(2000)
Proceedings of the USENIX LISA
-
-
Burch, H.1
Cheswick, B.2
-
7
-
-
84962214242
-
DeIdUouS: decentralized source identification for network-based intrusions
-
Chang, H.Y., Narayan, R., Wu, S.F., Vetter, B.M., Wang, X., Brown, M., Yuill, J.J., Sargor, C., Jou, F. and Gong, F. (1999) ‘DeIdUouS: decentralized source identification for network-based intrusions’, Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management, May.
-
(1999)
Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management
, vol.May
-
-
Chang, H.Y.1
Narayan, R.2
Wu, S.F.3
Vetter, B.M.4
Wang, X.5
Brown, M.6
Yuill, J.J.7
Sargor, C.8
Jou, F.9
Gong, F.10
-
8
-
-
84952968771
-
-
Cisco Systems, Inc. (2004) ‘IP source tracker’, Available at: http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120limit/120s/120s21/ipst.pdf.
-
(2004)
IP source tracker
-
-
-
9
-
-
3543090485
-
A marking scheme using Huffman codes for IP traceback
-
Algorithms and Networks (ISPAN)
-
Choi, K.H. and Dai, H.K. (2004) ‘A marking scheme using Huffman codes for IP traceback’, Proceedings of the Seventh International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN), May, pp.421–428.
-
(2004)
Proceedings of the Seventh International Symposium on Parallel Architectures
, vol.May
, pp. 421-428
-
-
Choi, K.H.1
Dai, H.K.2
-
10
-
-
85025403958
-
An algebraic approach to IP traceback
-
Dean, D., Franklin, M. and Stubblefield, A. (2002) ‘An algebraic approach to IP traceback’, Proceedings of the Network and Distributed System Security (NDSS), Vol. 5, pp.119–137.
-
(2002)
Proceedings of the Network and Distributed System Security (NDSS)
, vol.5
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
12
-
-
84877734993
-
ISP security – real world techniques
-
Greene, B.R., Morrow, L.C. and Gemberling, B.W. (2001) ‘ISP security – real world techniques’, NANOG23 Meeting, Available at: http://www.nanog.org/mtg-0110/greene.html, October.
-
(2001)
NANOG23 Meeting
, vol.October
-
-
Greene, B.R.1
Morrow, L.C.2
Gemberling, B.W.3
-
14
-
-
84952961851
-
Implementing border router packet marking in today’s internet
-
Hamadeh, I. and Kesidis, G. (2003b) ‘Implementing border router packet marking in today’s internet’, Technical Report: CSE-03-014, August.
-
(2003)
Technical Report: CSE-03-014
, vol.August
-
-
Hamadeh, I.1
Kesidis, G.2
-
19
-
-
0002461674
-
Caller identification system in the internet environment
-
Jung, H.T., Kim, H.L., Seo, Y.M., Choe, G., Min, S.L., Kim, C.S. and Koh, K. (1993) ‘Caller identification system in the internet environment’, Proceedings of the Fourth USENIX Security Symposium, October.
-
(1993)
Proceedings of the Fourth USENIX Security Symposium
, vol.October
-
-
Jung, H.T.1
Kim, H.L.2
Seo, Y.M.3
Choe, G.4
Min, S.L.5
Kim, C.S.6
Koh, K.7
-
20
-
-
84878701299
-
Exploiting underlying structure for detailed reconstruction of an internet-scale event
-
Kumar, A., Paxson, V. and Weaver, N. (2005) ‘Exploiting underlying structure for detailed reconstruction of an internet-scale event’, Proceedings of the ACM Internet Measurement Conference, October.
-
(2005)
Proceedings of the ACM Internet Measurement Conference
, vol.October
-
-
Kumar, A.1
Paxson, V.2
Weaver, N.3
-
21
-
-
4143130107
-
Scalable packet digesting schemes for IP traceback
-
Lee, T., Wu, W. and Huang, W. (2004) ‘Scalable packet digesting schemes for IP traceback’, Proceedings of the IEEE International Conference on Communications, June.
-
(2004)
Proceedings of the IEEE International Conference on Communications
, vol.June
-
-
Lee, T.1
Wu, W.2
Huang, W.3
-
22
-
-
3543126644
-
Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation
-
Li, J., Sung, M., Xu, J., Li, L. and Zhao, Q. (2004) ‘Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation’, Proceedings of the IEEE Symposium on Security and Privacy, May.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.May
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
Zhao, Q.5
-
23
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan, R., Massey, D., Wu, C., Wu, S., Ioannidis, J., Paxson, V. and Shenker, S. (2002) ‘Controlling high bandwidth aggregates in the network’, Computer Communications Review, July.
-
(2002)
Computer Communications Review
, vol.July
-
-
Mahajan, R.1
Massey, D.2
Wu, C.3
Wu, S.4
Ioannidis, J.5
Paxson, V.6
Shenker, S.7
-
24
-
-
84952965310
-
On design and evaluation of intention-driven ICMP traceback
-
Mankin, A., Massey, D., Wu, C.L., Wu, S.F. and Zhang, L. (2001) ‘On design and evaluation of intention-driven ICMP traceback’, Internet Draft, IETF: draft-wu-itrace-intention-00.txt, October.
-
(2001)
Internet Draft, IETF: draft-wu-itrace-intention-00.txt
, vol.October
-
-
Mankin, A.1
Massey, D.2
Wu, C.L.3
Wu, S.F.4
Zhang, L.5
-
25
-
-
0038742366
-
Adjusted probabilistic packet marking for IP traceback
-
Peng, T., Leckie, C. and Ramamohanarao, K. (2002) ‘Adjusted probabilistic packet marking for IP traceback’, Networking 2002, May.
-
(2002)
Networking 2002
, vol.May
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
26
-
-
84964474589
-
Hardware support for a hash-based IP traceback
-
Sanchez, L.A., Milliken, W.C., Snoeren, A.C., Tchakountio, F., Jones, C.E., Kent, S.T. and Partridge, C. (2001) ‘Hardware support for a hash-based IP traceback’, Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II), June.
-
(2001)
Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.June
-
-
Sanchez, L.A.1
Milliken, W.C.2
Snoeren, A.C.3
Tchakountio, F.4
Jones, C.E.5
Kent, S.T.6
Partridge, C.7
-
27
-
-
0033650584
-
Practical network support for IP traceback
-
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) ‘Practical network support for IP traceback’, Proceedings of the ACM SIGCOMM, August, pp.295–306.
-
(2000)
Proceedings of the ACM SIGCOMM
, vol.August
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
28
-
-
84962267363
-
Infrastructure for intrusion detection and response
-
Schnackenberg, D., Djahandari, K. and Sterne, D. (2000) ‘Infrastructure for intrusion detection and response’, Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), January.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX)
, vol.January
-
-
Schnackenberg, D.1
Djahandari, K.2
Sterne, D.3
-
29
-
-
84964506507
-
Cooperative intrusion traceback and response architecture (CITRA)
-
Schnackenberg, D., Holliday, H., Smith, R., Djahandari, K. and Sterne, D. (2001) ‘Cooperative intrusion traceback and response architecture (CITRA)’, Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II), June.
-
(2001)
Proceedings of the Second DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.June
-
-
Schnackenberg, D.1
Holliday, H.2
Smith, R.3
Djahandari, K.4
Sterne, D.5
-
30
-
-
0002473030
-
DIDS – motivation, architecture, and an early prototype
-
Snapp, S.R., Brentano, J., Dias, G.V., Heberlein, L.T., Ho, C., Levitt, K.N. and Mukherjee, B. (1991) ‘DIDS – motivation, architecture, and an early prototype’, Proceedings of the 14th National Computer Security Conference, pp.167–176.
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Heberlein, L.T.4
Ho, C.5
Levitt, K.N.6
Mukherjee, B.7
-
31
-
-
0001887844
-
Hash-based IP traceback
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T. and Strayer, W.T. (2001) ‘Hash-based IP traceback’, Proceedings of the ACM SIGCOMM, August.
-
(2001)
Proceedings of the ACM SIGCOMM
, vol.August
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
32
-
-
0036947597
-
Single-packet IP traceback
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T. and Strayer, W.T. (2002) ‘Single-packet IP traceback’, IEEE/ACM Transactions on Networking, December.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.December
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
33
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Song, D.X. and Perrig, A. (2001) ‘Advanced and authenticated marking schemes for IP traceback’, Proceedings of the IEEE INFOCOM, April.
-
(2001)
Proceedings of the IEEE INFOCOM
, vol.April
-
-
Song, D.X.1
Perrig, A.2
-
35
-
-
0000949239
-
GrIDS – a graph based intrustion detection system for large networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R. and Zerkle, D. (1996) ‘GrIDS – a graph based intrustion detection system for large networks’, Proceedings of the 19th National Information Systems Security Conference, October.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, vol.October
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
38
-
-
84904261405
-
Sleepy watermark tracing: an active network-based intrusion response framework
-
Wang, X., Reeves, D.S., Wu, S.F. and Yuill, J. (2001) ‘Sleepy watermark tracing: an active network-based intrusion response framework’, Proceedings of the International Conference on Information Security, June, pp.369–384.
-
(2001)
Proceedings of the International Conference on Information Security
, vol.June
, pp. 369-384
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
39
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
Wang, X., Reeves, D.S. and Wu, S.F. (2002) ‘Inter-packet delay based correlation for tracing encrypted connections through stepping stones’, Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS), October, pp.244–263.
-
(2002)
Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS)
, vol.October
, pp. 244-263
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
41
-
-
84952965936
-
Intention driven ICMP traceback
-
Wu, C.L., Zhang, L., Massey, D. and Mankin, A. (2001) ‘Intention driven ICMP traceback’, Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN), February, pp.159–165.
-
(2001)
Proceedings of the IEEE International Conference on Computer Communication and Networks (ICCCN)
, vol.February
, pp. 159-165
-
-
Wu, C.L.1
Zhang, L.2
Massey, D.3
Mankin, A.4
-
42
-
-
27544495684
-
Worm origin identification using random moonwalks
-
Xie, Y., Sekar, V., Maltz, D., Reiter, M. and Zhang, H. (2005) ‘Worm origin identification using random moonwalks’, Proceedings of the IEEE Symposium on Security and Privacy, May.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.May
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
-
43
-
-
25844461391
-
FIT: fast internet traceback
-
Yaar, A., Song, D.X. and Perrig, A. (2005) ‘FIT: fast internet traceback’, Proceedings of the IEEE INFOCOM, March.
-
(2005)
Proceedings of the IEEE INFOCOM
, vol.March
-
-
Yaar, A.1
Song, D.X.2
Perrig, A.3
-
46
-
-
84952970616
-
-
A border gateway router is an ISP backbone router that is adjacent to one or more backbone routers that could belong to a customer or another ISP
-
A border gateway router is an ISP backbone router that is adjacent to one or more backbone routers that could belong to a customer or another ISP.
-
-
-
-
47
-
-
84952974745
-
-
A tracking node is a sophisticated device that could perform routing, analysis and filtering. It can examine datagrams, drop them or forward them to other routers
-
A tracking node is a sophisticated device that could perform routing, analysis and filtering. It can examine datagrams, drop them or forward them to other routers.
-
-
-
|