-
1
-
-
85084163167
-
Multops: A data-structure for bandwidth attack detection
-
T. M. Gil and M. Poletter, "Multops: a data-structure for bandwidth attack detection," in USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Gil, T.M.1
Poletter, M.2
-
3
-
-
68149178268
-
Ip packet size entropy-based scheme for detection of dos/ddos attacks
-
P. DU and S. Abe, "Ip packet size entropy-based scheme for detection of dos/ddos attacks," IEICE Trans Inf. & Syst, vol. 5, pp. 1274-1281, 2008.
-
(2008)
IEICE Trans Inf. & Syst
, vol.5
, pp. 1274-1281
-
-
Du, P.1
Abe, S.2
-
4
-
-
77955352989
-
Pay-as-you-admit: A new charging model of cloud computing
-
P. Du, M. Chen, and A. Nakao, "Pay-as-you-admit: A new charging model of cloud computing," in ICOIN, 2010.
-
(2010)
ICOIN
-
-
Du, P.1
Chen, M.2
Nakao, A.3
-
6
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," in USENIX SECURITY, 1998.
-
(1998)
USENIX SECURITY
-
-
Paxson, V.1
-
7
-
-
1642293015
-
Snort - Lightweight intrusion detection for networks
-
M. Roesch, "Snort - lightweight intrusion detection for networks," in USENIX LISA, 1999.
-
(1999)
USENIX LISA
-
-
Roesch, M.1
-
8
-
-
77957788301
-
Ddos defense as a network service
-
P. Du and A. Nakao, "Ddos defense as a network service," in IEEE/IFIP NOMS, 2010.
-
(2010)
IEEE/IFIP NOMS
-
-
Du, P.1
Nakao, A.2
-
9
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing," in IETF, RFC 2827, 1998.
-
(1998)
IETF, RFC 2827
-
-
Ferguson, P.1
Senie, D.2
-
10
-
-
84976477986
-
-
"Spoofer project," http://spoofer.csail.mit.edu/.
-
Spoofer Project
-
-
-
11
-
-
84874744472
-
Using packet symmetry to curtail malicious traffic
-
C. Kreibich, A. Warfield, J. Crowcroft, S. Hand, and I. Pratt, "Using packet symmetry to curtail malicious traffic," in ACM HotNets, 2005.
-
(2005)
ACM HotNets
-
-
Kreibich, C.1
Warfield, A.2
Crowcroft, J.3
Hand, S.4
Pratt, I.5
-
12
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," ACM SIGCOMM Computer Communication Review, vol. 32, pp. 62-73, 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
13
-
-
17744383634
-
Controlling high-bandwidth flows at the congested router
-
R. Mahajan, S. Floyd, and D. Wetherall, "Controlling high-bandwidth flows at the congested router," in IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
15
-
-
84871993728
-
-
"Cisco netflow," http://www.cisco.com/web/go/netflow.
-
Cisco Netflow
-
-
-
16
-
-
77955358592
-
-
Arbor Network, "peakflow," http://arbornetworks.com.
-
Peakflow
-
-
-
18
-
-
77955392341
-
-
"Planetlab," http://www.planet-lab.org/.
-
-
-
-
19
-
-
77955344424
-
-
"Netperf," http://www.netperf.org/.
-
-
-
-
21
-
-
36048986923
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, "Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds," in USENIX NSDI, 2005.
-
(2005)
USENIX NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
22
-
-
3042859154
-
Resisting syn fooding dos attacks with a syn cache
-
J. Lemon, "Resisting syn fooding dos attacks with a syn cache," in USENIX BSDCon, 2002.
-
(2002)
USENIX BSDCon
-
-
Lemon, J.1
|