-
2
-
-
24944515425
-
Victim-assisted Mitigation Technique for TCP-Based Refelector DDoS Attacks
-
D. Basheer and G. Manimaran. Victim-assisted Mitigation Technique for TCP-Based Refelector DDoS Attacks. In 4th IFIP-TC6, Networking, pages 191-204, 2005.
-
(2005)
4th IFIP-TC6, Networking
, pp. 191-204
-
-
Basheer, D.1
Manimaran, G.2
-
6
-
-
38049106551
-
Finding SHA-1 Characteristics: General Results and Applications
-
C. De Cannière and C. Rechberger. Finding SHA-1 Characteristics: General Results and Applications. In ASIACRYPT, 2006.
-
(2006)
ASIACRYPT
-
-
De Cannière, C.1
Rechberger, C.2
-
7
-
-
39049160574
-
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
-
Z. Duan, X. Yuan, and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
13
-
-
0040291388
-
The Click Modular Router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M.F. Kasshoek. The Click Modular Router. In ACM Transactions on Computer Systems (TOCS), 2000.
-
(2000)
ACM Transactions on Computer Systems (TOCS)
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kasshoek, M.F.5
-
14
-
-
34748852577
-
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention
-
H. Lee, M. Kwon, G. Hasker, and A. Perrig. BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention. In ASIAN ACM Symposium on Information, Computer and Communications Security, 2007.
-
ASIAN ACM Symposium on Information, Computer and Communications Security, 2007
-
-
Lee, H.1
Kwon, M.2
Hasker, G.3
Perrig, A.4
-
15
-
-
0036349004
-
SAVE: Source Address Validity Enforcement Protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement Protocol. In INFOCOM, 2002.
-
(2002)
INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
16
-
-
77950795295
-
A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512
-
R. Lien, T. Grembowksi, and K. Gaj. A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. In RSA Cryptographers' Track, 2004.
-
(2004)
RSA Cryptographers' Track
-
-
Lien, R.1
Grembowksi, T.2
Gaj, K.3
-
17
-
-
66249102841
-
To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets
-
X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
18
-
-
38049148364
-
Efficient and Secure Source Authentication with Packet Passports
-
X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In SRUTI, 2006.
-
(2006)
SRUTI
-
-
Liu, X.1
Yang, X.2
Wetherall, D.3
Anderson, T.4
-
20
-
-
33745205813
-
Inferring Internet Denial-of-Service Activity
-
May
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage. Inferring Internet Denial-of-Service Activity. ACM Transactions on Computer Systems (TOCS), 24(2), May 2006.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
21
-
-
0001083965
-
On the Effectiveness of Route-Based Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
K. Park and H. Lee. On the Effectiveness of Route-Based Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
22
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denialof- Service Attacks
-
V. Paxson. An Analysis of Using Reflectors for Distributed Denialof- Service Attacks. In ACM SIGCOMM Computer Communications Review, 2001.
-
(2001)
ACM SIGCOMM Computer Communications Review
-
-
Paxson, V.1
-
24
-
-
33749831619
-
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
-
October
-
A. Perrig, D. Song, and A. Yaar. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications, 24(10):1853-1863, October 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1853-1863
-
-
Perrig, A.1
Song, D.2
Yaar, A.3
-
28
-
-
42049090373
-
Packet Forwarding with Source Verification
-
C. A. Shue, M. Gupta, and M. P. Davy. Packet Forwarding with Source Verification. Computer Networks, 52(8):1567-1582, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.8
, pp. 1567-1582
-
-
Shue, C.A.1
Gupta, M.2
Davy, M.P.3
-
30
-
-
36949026829
-
Realistic and Responsive Network Traffic Generation
-
K. Vishwanath and A. Vahdat. Realistic and Responsive Network Traffic Generation. In ACM SIGCOMM: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, 2006.
-
ACM SIGCOMM: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2006
-
-
Vishwanath, K.1
Vahdat, A.2
-
32
-
-
77950805032
-
-
Advanced Network Architecture Group. ANA Spoofer Project
-
Advanced Network Architecture Group. ANA Spoofer Project. http://spoofer.csail.mit.edu.
-
-
-
-
33
-
-
77950815235
-
-
CAIDA CoralReef. http://www.caida.org/tools/measurement/.
-
-
-
-
34
-
-
84858894791
-
-
DETER testbed. http://www.isi.edu/deter.
-
DETER Testbed
-
-
-
35
-
-
77950788049
-
-
MAWI Working Group Traffic Archive. http://mawi.wide.ad.jp.
-
-
-
-
36
-
-
77950834867
-
-
Tcpdump. http://www.tcpdump.org/.
-
-
-
|