-
1
-
-
33745205813
-
Inferring internet denial-of-service activity
-
May
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," ACM Trans. Computer Systems, vol.24, no.2, pp. 115-139, May 2006.
-
(2006)
ACM Trans. Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
2
-
-
1242287724
-
A framework for classifying denial of service attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A Framework for Classifying Denial of Service Attacks," Proc. ACM SIGCOMM '03, pp. 99-110, 2003.
-
(2003)
Proc. ACM SIGCOMM '03
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
3
-
-
1542273553
-
A framework for the analysis of denial of service attacks
-
Mar.
-
A.R. Sharafat and M.S. Fallah, "A Framework for the Analysis of Denial of Service Attacks," The Computer J., vol.47, no.2, pp. 179-192, Mar. 2004.
-
(2004)
The Computer J.
, vol.47
, Issue.2
, pp. 179-192
-
-
Sharafat, A.R.1
Fallah, M.S.2
-
4
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a Denial of Service Attack on TCP," Proc. 18th IEEE Symp. Security and Privacy, pp. 208-223, 1997.
-
(1997)
Proc. 18th IEEE Symp. Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
5
-
-
0013240874
-
-
CERT Coordination Center, Carnegie Mellon Univ.
-
Smurf IP Denial-of-Service Attacks. CERT Coordination Center, Carnegie Mellon Univ., 1998.
-
(1998)
Smurf IP Denial-of-Service Attacks
-
-
-
6
-
-
0009600844
-
-
CERT Coordination Center, Carnegie Mellon Univ.
-
Denial-of-Service Tools. CERT Coordination Center, Carnegie Mellon Univ., 1999.
-
(1999)
Denial-of-Service Tools
-
-
-
7
-
-
0011224227
-
-
CERT Coordination Center, Carnegie Mellon Univ.
-
Denial-of-Service Attack via Ping. CERT Coordination Center, Carnegie Mellon Univ., 1996.
-
(1996)
Denial-of-Service Attack Via Ping
-
-
-
8
-
-
0011192575
-
-
CERT Coordination Center, Carnegie Mellon Univ.
-
IP Denial-of-Service Attacks. CERT Coordination Center, Carnegie Mellon Univ., 1997.
-
(1997)
IP Denial-of-Service Attacks
-
-
-
9
-
-
11144272176
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Apr.
-
J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Rev., vol.34, no.2, pp. 39-53, Apr. 2004.
-
(2004)
ACM SIGCOMM Computer Communication Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
11
-
-
0033650584
-
Practical network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM '00, pp. 295-306, 2000.
-
(2000)
Proc. ACM SIGCOMM '00
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
12
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM '01, pp. 878-886, 2001.
-
(2001)
Proc. IEEE INFOCOM '01
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
13
-
-
0037810705
-
PI: A path identification mechanism to defend against DDoS attacks
-
A. Yaar, A. Perrig, and D. Song, "PI: A Path Identification Mechanism to Defend Against DDoS Attacks," Proc. IEEE Symp. Security and Privacy, pp. 93-109, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 93-109
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
14
-
-
85025403958
-
An algebraic approach to IP traceback
-
May
-
D. Dean, M. Franklin, and A. Stubblefield, "An Algebraic Approach to IP Traceback," ACM. Trans. Information and System Security, vol.5, no.2, pp. 119-137, May 2002.
-
(2002)
ACM. Trans. Information and System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
15
-
-
0034775309
-
Hash-based IP traceback
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, and T. Strayer, "Hash-Based IP Traceback," Proc. ACM SIGCOMM '01, pp. 3-14, 2001.
-
(2001)
Proc. ACM SIGCOMM '01
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, T.7
-
16
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
A. Yaar, D. Song, and A. Perrig, "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp. Security and Privacy, pp. 130-146, 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 130-146
-
-
Yaar, A.1
Song, D.2
Perrig, A.3
-
17
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
July/Sept.
-
J. Mirkovic and P. Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks," IEEE Trans. Dependable and Secure Computing, vol.2, no.3, pp. 216-232, July/Sept. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
19
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
Jan.
-
C. Meadows, "A Cost-Based Framework for Analysis of Denial of Service in Networks," J. Computer Security, vol.9, nos. 1-2, pp. 143-164, Jan. 2001.
-
(2001)
J. Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
21
-
-
0006013621
-
Towards network denial of service resistant protocols
-
J. Leiwo, P. Nikander, and T. Aura, "Towards Network Denial of Service Resistant Protocols," Proc. 15th Int'l Information Security Conf., pp. 301-310, 2000.
-
(2000)
Proc. 15th Int'l Information Security Conf.
, pp. 301-310
-
-
Leiwo, J.1
Nikander, P.2
Aura, T.3
-
25
-
-
0037517134
-
DoS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles," Proc. Eighth Security Protocols Workshop, pp. 170-178, 2000.
-
(2000)
Proc. Eighth Security Protocols Workshop
, pp. 170-178
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
26
-
-
14844300104
-
New client puzzle outsourcing techniques for dos resistance
-
B. Waters, A. Jules, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance," Proc. ACM Conf. Computer and Comm. Security, pp. 246-256, 2004.
-
(2004)
Proc. ACM Conf. Computer and Comm. Security
, pp. 246-256
-
-
Waters, B.1
Jules, A.2
Halderman, J.3
Felten, E.4
-
27
-
-
25644445353
-
The design and implementation of network puzzles
-
W. Feng, E. Kaiser, W. Feng, and A. Luu, "The Design and Implementation of Network Puzzles," Proc. 24th Ann. Joint Conf. IEEE Computer and Comm. Societies, pp. 2372-2382, 2005.
-
(2005)
Proc. 24th Ann. Joint Conf. IEEE Computer and Comm. Societies
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
-
28
-
-
0038825046
-
Defending against denial-of-service attacks with puzzle auctions
-
X. Wang and M. Reiter, "Defending Against Denial-of-Service Attacks with Puzzle Auctions," Proc. IEEE Security and Privacy, pp. 78-92, 2003.
-
(2003)
Proc. IEEE Security and Privacy
, pp. 78-92
-
-
Wang, X.1
Reiter, M.2
-
29
-
-
15944370066
-
A game based analysis of the client puzzle approach to defend against dos attacks
-
B. Bencsath, I. Vajda, and L. Buttyan, "A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks," Proc. 11th Int'l Conf. Software, Telecomm., and Computer Networks, pp. 763-767, 2003.
-
(2003)
Proc. 11th Int'l Conf. Software, Telecomm., and Computer Networks
, pp. 763-767
-
-
Bencsath, B.1
Vajda, I.2
Buttyan, L.3
-
32
-
-
0000028492
-
The folk theorem for repeated games with discounting and incomplete information
-
May
-
D. Fudenberg and E. Maskin, "The Folk Theorem for Repeated Games with Discounting and Incomplete Information," Econometrica, vol.54, no.3, pp. 533-554, May 1986.
-
(1986)
Econometrica
, vol.54
, Issue.3
, pp. 533-554
-
-
Fudenberg, D.1
Maskin, E.2
-
33
-
-
85045893940
-
Moderately hard, memory-bound functions
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber, "Moderately Hard, Memory-Bound Functions," Proc. Network and Distributed System Security Symp. (NDSS '03), pp. 25-39, 2003.
-
(2003)
Proc. Network and Distributed System Security Symp. (NDSS '03)
, pp. 25-39
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
34
-
-
34250133690
-
Note on nash equilibria in infinitely repeated games with incomplete information
-
Sept.
-
F. Forges, "Note on Nash Equilibria in Infinitely Repeated Games with Incomplete Information," Int'l J. Game Theory, vol.13, no.3, pp. 179-187, Sept. 1984.
-
(1984)
Int'l J. Game Theory
, vol.13
, Issue.3
, pp. 179-187
-
-
Forges, F.1
-
35
-
-
0001522622
-
Nonzerosum two-person repeated games with incomplete information
-
Feb.
-
S. Hart, "Nonzerosum Two-Person Repeated Games with Incomplete Information," Math. of Operations Research, vol.10, no.1, pp. 117-153, Feb. 1985.
-
(1985)
Math. of Operations Research
, vol.10
, Issue.1
, pp. 117-153
-
-
Hart, S.1
-
36
-
-
70350099314
-
Repeated games of incomplete information: Non-zero sum
-
R. Aumann and S. Hart, eds., Elsevier Science
-
F. Forges, "Repeated Games of Incomplete Information: Non-Zero Sum," Handbook of Game Theory, R. Aumann and S. Hart, eds., vol.1, pp. 155-177, Elsevier Science, 1992.
-
(1992)
Handbook of Game Theory
, vol.1
, pp. 155-177
-
-
Forges, F.1
|