-
3
-
-
0141762464
-
Observation and Analysis of BGP Behavior under Stress
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress," in Internet Measurement Workshop, November 2002.
-
Internet Measurement Workshop, November 2002
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Mankin, A.6
Wu, S.7
Zhang, L.8
-
4
-
-
77953077374
-
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," in International World Wide Web Conference, May 2002, pp. 252-262.
-
International World Wide Web Conference, May 2002
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
5
-
-
85034043506
-
Protecting Web Servers from Distributed Denial of Service Attacks
-
F. Kargl, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," in World Wide Web, 2001, pp. 514-524.
-
(2001)
World Wide Web
, pp. 514-524
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
7
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm," http://www.caida.org/ outreach/papers/2003/sapphire/, 2003.
-
(2003)
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
8
-
-
0002459783
-
Client Puzzles: A Cryptographic Defense Against Connection Depletion
-
A. Juels and J. Brainard, "Client Puzzles: A Cryptographic Defense Against Connection Depletion," in NDSS, 1999, pp. 151-165.
-
(1999)
NDSS
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
10
-
-
84949979635
-
DOS-Resistant Authentication with Client Puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," Lecture Notes in Computer Science, vol. 2133, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
11
-
-
1642344572
-
Towards Network Denial of Service Resistant Protocols
-
J. Leiwo, T. Aura, and P. Nikander, "Towards Network Denial of Service Resistant Protocols," in SEC, 2000, pp. 301-310.
-
(2000)
SEC
, pp. 301-310
-
-
Leiwo, J.1
Aura, T.2
Nikander, P.3
-
12
-
-
77953177112
-
Security for Peer-to-Peer Routing Overlays
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach, "Security for Peer-to-Peer Routing Overlays," in Proceedings of OSDI, December 2002.
-
Proceedings of OSDI, December 2002
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
13
-
-
3242814357
-
-
M. Abadi, M. Burrows, M. Manasse, and T. Wobber, "Moderately Hard, Memory-bound Functions," 2003.
-
(2003)
Moderately Hard, Memory-bound Functions
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
14
-
-
33744479345
-
Freenet: A Distributed Anonymous Information Storage and Retrieval System
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," Lecture Notes in Computer Science, vol. 2009, pp. 46+, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
15
-
-
1642415913
-
-
B. Braden, N. Chiappa, D. Clark, T. Faber, A. Falk, M. Handley, S. Shenker, K. Sollins, and J. Wroclawski, "NewArch Project: Future-Generation Internet Architecture," http://www.isi.edu/newarch/, 2003.
-
(2003)
NewArch Project: Future-Generation Internet Architecture
-
-
Braden, B.1
Chiappa, N.2
Clark, D.3
Faber, T.4
Falk, A.5
Handley, M.6
Shenker, S.7
Sollins, K.8
Wroclawski, J.9
-
16
-
-
1642388517
-
-
J. Postel, D. Johnson, T. Markson, B. Simpson, and Z. Su, "ICMP Type Numbers," http://www.iana.org/assignments/icmp-parameters, 2001.
-
(2001)
ICMP Type Numbers
-
-
Postel, J.1
Johnson, D.2
Markson, T.3
Simpson, B.4
Su, Z.5
-
17
-
-
1642281162
-
-
B. Carpenter, D. Estrin, D. Farinacci, G. Finn, C. Graff, D. Katz, J. Postel, A. Malis, and R. Ullman, "IP Option Numbers," http://www.iana.org/assignments/ip-parameters, 2001.
-
(2001)
IP Option Numbers
-
-
Carpenter, B.1
Estrin, D.2
Farinacci, D.3
Finn, G.4
Graff, C.5
Katz, D.6
Postel, J.7
Malis, A.8
Ullman, R.9
-
18
-
-
1642382055
-
-
S. Bellovin, B. Braden, M. Bridges, S. Knowles, J. Kay, K. Scott, S. Subramaniam, and V. Sukonnik, "TCP Option Numbers," http://www.iana.org/assignments/tcp-parameters, 2001.
-
(2001)
TCP Option Numbers
-
-
Bellovin, S.1
Braden, B.2
Bridges, M.3
Knowles, S.4
Kay, J.5
Scott, K.6
Subramaniam, S.7
Sukonnik, V.8
-
22
-
-
0024681099
-
The Internet Worm: Crisis and Aftermath
-
June
-
E. Spafford, "The Internet Worm: Crisis and Aftermath," Communications of the ACM, vol. 32, no. 6, pp. 678-698, June 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 678-698
-
-
Spafford, E.1
-
24
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," Computer Communication Review, vol. 32, no. 3, July 2002.
-
(2002)
Computer Communication Review
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
26
-
-
77953209282
-
-
U.S. Department of Justice: Federal Bureau of Investigation, "Mafiaboy," http://www.fbi.gov/pressrel/pressrel00/mafia080700.htm, 2000.
-
(2000)
Mafiaboy
-
-
-
27
-
-
0003375670
-
An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
-
V. Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks," Computer Communication Review, vol. 31, no. 3, July 2001.
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
28
-
-
1642341302
-
-
Network Dweebs Corporation, "Apache DoS Evasive Maneuvers Module," http://www.networkdweebs.com/stuff/security.html, 2003.
-
(2003)
Apache DoS Evasive Maneuvers Module
-
-
-
31
-
-
0035012756
-
Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness
-
W. Feng, D. Kandlur, D. Saha, and K. Shin, "Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness," in Proc. of INFOCOM, April 2001.
-
Proc. of INFOCOM, April 2001
-
-
Feng, W.1
Kandlur, D.2
Saha, D.3
Shin, K.4
-
36
-
-
85027196839
-
TCP Vegas: New Techniques for Congestion Detection and Avoidance
-
L. Brakmo, S. O'Malley, and L. Peterson, "TCP Vegas: New Techniques for Congestion Detection and Avoidance," in Proceedings of ACM SIGCOMM, October 1994, pp. 24-35.
-
Proceedings of ACM SIGCOMM, October 1994
, pp. 24-35
-
-
Brakmo, L.1
O'Malley, S.2
Peterson, L.3
-
37
-
-
1642331547
-
Modified TCP Congestion Avoidance Algorithm
-
April
-
V. Jacobson, "Modified TCP Congestion Avoidance Algorithm," end2end-interest mailing list (ftp://ftp.ee.lbl.gov/email/vanj.90apr30.txt), April 1990.
-
(1990)
End2end-interest Mailing List
-
-
Jacobson, V.1
-
38
-
-
0003415258
-
-
RFC 2001, January
-
W. Stevens, "TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms," RFC 2001, January 1997.
-
(1997)
TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms
-
-
Stevens, W.1
-
39
-
-
0002724784
-
Modeling TCP Throughput: A Simple Model and its Empirical Validation
-
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, "Modeling TCP Throughput: A Simple Model and its Empirical Validation," in Proceedings of ACM SIGCOMM, September 1998.
-
Proceedings of ACM SIGCOMM, September 1998
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.3
Kurose, J.4
-
40
-
-
0027647490
-
Random Early Detection Gateways for Congestion Avoidance
-
August
-
S. Floyd and V. Jacobson, "Random Early Detection Gateways for Congestion Avoidance," ACM/IEEE Transactions on Networking, vol. 1, no. 4, pp. 397-413, August 1993.
-
(1993)
ACM/IEEE Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
-
41
-
-
0035000477
-
On Designing Improved Controllers for AQM Routers Supporting TCP Flows
-
C. Hollot, V. Misra, D. Towsley, and W. Gong, "On Designing Improved Controllers for AQM Routers Supporting TCP Flows," in INFOCOM, 2001, pp. 1726-1734.
-
(2001)
INFOCOM
, pp. 1726-1734
-
-
Hollot, C.1
Misra, V.2
Towsley, D.3
Gong, W.4
-
43
-
-
0035331741
-
REM: Active Queue Management
-
May
-
S. Athuraliya, S. Low, V. Li, and Q. Yin, "REM: Active Queue Management," IEEE Network Magazine, vol. 15, no. 3, May 2001.
-
(2001)
IEEE Network Magazine
, vol.15
, Issue.3
-
-
Athuraliya, S.1
Low, S.2
Li, V.3
Yin, Q.4
-
44
-
-
0036670345
-
The Blue Queue Management Algorithms
-
August
-
W. Feng, D. Kandlur, D. Saha, and K. Shin, "The Blue Queue Management Algorithms," IEEE/ACM Transactions on Networking, vol. 10, no. 4, August 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.4
-
-
Feng, W.1
Kandlur, D.2
Saha, D.3
Shin, K.4
-
45
-
-
84949199141
-
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
-
D. Mankins, R. Krishnan, C. Boyd, J. Zaho, and M. Frentz, "Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing," in Proceedings of Annual Computer Security Applications Conference (ACSAC 2001), 2001.
-
Proceedings of Annual Computer Security Applications Conference (ACSAC 2001), 2001
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zaho, J.4
Frentz, M.5
|