-
1
-
-
0020915186
-
A Note on the denial-of-service problem
-
Oakland, CA, USA, April 25-27 IEEE Computer Society, Washington, DC, USA
-
Gilgor, V. (1983) A Note on the Denial-of-Service Problem. Proc. Symp. Security and Privacy (SP'83), Oakland, CA, USA, April 25-27, pp. 139-149. IEEE Computer Society, Washington, DC, USA.
-
(1983)
Proc. Symp. Security and Privacy (SP'83)
, pp. 139-149
-
-
Gilgor, V.1
-
2
-
-
0003804730
-
A weakness in the 4.2bsd unix tcp/ip software
-
AT&T Bell Labs, Murray Hills, NJ, USA
-
Morris, R.T. (1985) A Weakness in the 4.2BSD Unix TCP/IP Software. Computer Science Technical Report 117,AT&T Bell Labs, Murray Hills, NJ, USA.
-
(1985)
Computer Science Technical Report 117
-
-
Morris, R.T.1
-
3
-
-
1542386294
-
ISS Realsecure pushes past newer IDS players
-
Shipley, G. (1999) ISS RealSecure pushes past newer IDS players. Netw. Comput., 10, 95-111.
-
(1999)
Netw. Comput.
, vol.10
, pp. 95-111
-
-
Shipley, G.1
-
4
-
-
51349112877
-
Detection syn flooding attacks using fuzzy logic
-
IEEE Computer Society, NewYork, NY, USA Washington, DC, USA, April 24-26
-
Tuncer, T. and Tatar,Y. (2008) Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance (ISA'08), Washington, DC, USA, April 24-26, pp. 321-325. IEEE Computer Society, NewYork, NY, USA.
-
(2008)
Proc. Int. Conf. Information Security and Assurance (ISA'08)
, pp. 321-325
-
-
Tuncer, T.1
Tatar, Y.2
-
5
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
Mirkovic, J. and Reiher, P. (2005) D-WARD: A source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secur. Comput., 2, 216-232.
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
6
-
-
48749093494
-
A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification
-
Asosheh, A. and Ramezani, N. (2008) A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification. WSEAS Trans. Comput., 7, 281-290.
-
(2008)
WSEAS Trans. Comput.
, vol.7
, pp. 281-290
-
-
Asosheh, A.1
Ramezani, N.2
-
7
-
-
29244475815
-
-
(1st edn) Prentice-Hall PTR, NJ, USA
-
Mirkovic, J., Dietrich, S., Dittrich, D. and Reiher, P. (2004) Internet Denial of Service Attack and Defense Mechanisms (1st edn). Prentice-Hall PTR, NJ, USA.
-
(2004)
Internet Denial of Service Attack and Defense Mechanisms
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
8
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
Paxson,V. (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACMSIGCOMMs Comput. Commun. Rev., 31, 38-47.
-
(2001)
ACMSIGCOMMs Comput. Commun. Rev.
, vol.31
, pp. 38-47
-
-
Paxson, V.1
-
9
-
-
0742276097
-
Inside the slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S. and Weaver, N. (2003) Inside the slammer worm. IEEE Secur. Priv., 1, 33-39.
-
(2003)
IEEE Secur. Priv.
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
10
-
-
4143103999
-
-
O'Reilly & Associates, Sebastopol, CA, USA
-
Hemenway, K. and Calishain, T. (2003) Spidering Hacks. O'Reilly & Associates, Sebastopol, CA, USA.
-
(2003)
Spidering Hacks
-
-
Hemenway, K.1
Calishain, T.2
-
11
-
-
59449092354
-
The tipping point
-
Goucher, W. (2009) The tipping point. Comput. Fraud Secur., 1, 11-13.
-
(2009)
Comput. Fraud Secur.
, vol.1
, pp. 11-13
-
-
Goucher, W.1
-
12
-
-
34547969527
-
The new front line: Estonia under cyberassault
-
Lesk, M. (2007) The new front line: Estonia under cyberassault. IEEE Secur. Priv., 5, 76-79.
-
(2007)
IEEE Secur. Priv.
, vol.5
, pp. 76-79
-
-
Lesk, M.1
-
13
-
-
24644453625
-
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
-
Jalili, R., Imani-Mehr, F., Amini, M. and Shahriari, H.-R. (2005) Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks. Lect. Notes Comput. Sci., 3439, 192-203.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3439
, pp. 192-203
-
-
Jalili, R.1
Imani-Mehr, F.2
Amini, M.3
Shahriari, H.-R.4
-
14
-
-
16644393989
-
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
-
Gavrilis, D. and Dermatas, E. (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Netw. ISDN Syst., 48, 235-245.
-
(2005)
Comput. Netw. ISDN Syst.
, vol.48
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
15
-
-
9444219650
-
Feature selection for robust detection of distributed denial-of-service attacks using genetic algorithms
-
Gavrilis, D., Tsoulos, I. and Dermatas, E. (2004) Feature selection for robust detection of distributed denial-of-service attacks using genetic algorithms. Lect. Notes Artif. Intell., 3025, 276-281.
-
(2004)
Lect. Notes Artif. Intell.
, vol.3025
, pp. 276-281
-
-
Gavrilis, D.1
Tsoulos, I.2
Dermatas, E.3
-
16
-
-
33745767769
-
Construction of high precision RBFNN with low false alarm for detecting flooding based denial of service attacks using stochastic sensitivity measure
-
Ng,W., Chan, A.,Yeung, D. and Tsang, E. (2006) Construction of high precision RBFNN with low false alarm for detecting flooding based denial of service attacks using stochastic sensitivity measure. Lect. Notes Artif. Intell., 3930, 851-860.
-
(2006)
Lect. Notes Artif. Intell.
, vol.3930
, pp. 851-860
-
-
Ng, W.1
Chan, A.2
Yeung, D.3
Tsang, E.4
-
17
-
-
33745301184
-
Multiple classifier system with feature grouping for intrusion detection: Mutual information approach
-
Chan, A., Ng, W., Yeung, D.S. and Tsang, E. (2005) Multiple classifier system with feature grouping for intrusion detection: Mutual information approach. Lect. Notes Artif. Intell., 3683, 141-148.
-
(2005)
Lect. Notes Artif. Intell.
, vol.3683
, pp. 141-148
-
-
Chan, A.1
Ng, W.2
Yeung, D.S.3
Tsang, E.4
-
18
-
-
33745775880
-
Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection
-
Chan, A., Yeung, D., Tsang, E. and Ng, W. (2006) Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection. Lect. Notes Artif. Intell., 3930, 682-690.
-
(2006)
Lect. Notes Artif. Intell.
, vol.3930
, pp. 682-690
-
-
Chan, A.1
Yeung, D.2
Tsang, E.3
Ng, W.4
-
19
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto, G., Roli, F. and Didaci, L. (2003) Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognit. Lett., 24, 1795-1803.
-
(2003)
Pattern Recognit. Lett.
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
20
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamala, S., Sung, A.H. and Abraham, A. (2005) Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. Appl., 28, 167-182.
-
(2005)
J. Netw. Comput. Appl.
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
21
-
-
35048886560
-
Detecting distributed denial of service (DDoS) attacks through inductive learning
-
Noh, S., Lee, C., Choi, K. and Jung, G. (2003) Detecting distributed denial of service (DDoS) attacks through inductive learning. Lect. Notes Comput. Sci., 2690, 286-295.
-
(2003)
Lect. Notes Comput. Sci.
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
22
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
Öke, G. and Loukas, G. (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J., 50, 717-727.
-
(2007)
Comput. J.
, vol.50
, pp. 717-727
-
-
Öke, G.1
Loukas, G.2
-
23
-
-
0000428263
-
Learning in the recurrent random neural network
-
Gelenbe, E. (1993) Learning in the recurrent random neural network. Neural Comput., 5, 154-164.
-
(1993)
Neural Comput.
, vol.5
, pp. 154-164
-
-
Gelenbe, E.1
-
24
-
-
33745922681
-
A combined data mining approach for DDoS attack detection
-
Kim, M., Na, H. Chae, K., Bang, H., and Na, J. (2004) A combined data mining approach for DDoS attack detection. Lect. Notes Comput. Sci., 3090, 943-950.
-
(2004)
Lect. Notes Comput. Sci.
, vol.3090
, pp. 943-950
-
-
Kim, M.1
Na Chae H, K.2
Bang, H.3
Na, J.4
-
25
-
-
2442505788
-
Towards multisensor data fusion for dos detection
-
Nicosia, Cyprus, March 14-17 ACM, NewYork, NY, USA
-
Siaterlis, C. and Maglaris, B. (2004) Towards Multisensor Data Fusion for DoS Detection. Proc. Symp. Applied Computing (SAC'04), Nicosia, Cyprus, March 14-17, pp. 439-446. ACM, NewYork, NY, USA.
-
(2004)
Proc. Symp. Applied Computing (SAC'04)
, pp. 439-446
-
-
Siaterlis, C.1
Maglaris, B.2
-
26
-
-
27144490740
-
Detecting anomalous network traffic with combined fuzzy-based approaches
-
He, H., Luo, X. and Liu, B. (2005) Detecting anomalous network traffic with combined fuzzy-based approaches. Lect. Notes Comput. Sci., 3645, 433-442.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3645
, pp. 433-442
-
-
He, H.1
Luo, X.2
Liu, B.3
-
27
-
-
24944522491
-
A probe detection model using the analysis of the fuzzy cognitive maps
-
Lee, S., Kim,Y., Lee, B., Kang, S. andYoun, C. (2005)A probe detection model using the analysis of the fuzzy cognitive maps. Lect. Notes Comput. Sci., 3480, 320-328.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3480
, pp. 320-328
-
-
Kimy., L.S.1
Lee, B.2
Kang, S.3
Youn, C.4
-
28
-
-
33746639174
-
Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks
-
Wei, W., Dong, Y., Lu, D. and Jin, G. (2006) Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks. Lect. Notes Comput. Sci., 3994, 57-64.
-
(2006)
Lect. Notes Comput. Sci.
, vol.3994
, pp. 57-64
-
-
Wei, W.1
Dong, Y.2
Lu, D.3
Jin, G.4
-
29
-
-
9444289934
-
Computational intelligent techniques for detecting denial of service attacks
-
Springer, Berlin, Germany Ottawa, Canada, May 17-20
-
Mukkamala, S. and Sung, A.H. (2004) Computational Intelligent Techniques for Detecting Denial of Service Attacks. Proc. Conf. Innovations in Applied Artificial Intelligence (IEA/AIE'04), Ottawa, Canada, May 17-20, pp. 616-624. Springer, Berlin, Germany.
-
(2004)
Proc. Conf. Innovations in Applied Artificial Intelligence (IEA/AIE'04)
, pp. 616-624
-
-
Mukkamala, S.1
Sung, A.H.2
-
30
-
-
33947265693
-
The feature selection and intrusion detection problems
-
Sung, A. and Mukkamala, S. (2004) The feature selection and intrusion detection problems. Lect. Notes Comput. Sci., 3321, 468-482.
-
(2004)
Lect. Notes Comput. Sci.
, vol.3321
, pp. 468-482
-
-
Sung, A.1
Mukkamala, S.2
-
31
-
-
33746191250
-
Intrusion detection based on behaviour mining and machine learning techniques
-
Mukkamala, S., Xu, D. and Sung, A. (2006) Intrusion detection based on behaviour mining and machine learning techniques. Lect. Notes Artif. Intell., 4031, 619-628.
-
(2006)
Lect. Notes Artif. Intell.
, vol.4031
, pp. 619-628
-
-
Mukkamala, S.1
Xu, D.2
Sung, A.3
-
32
-
-
84949971733
-
Understanding the longterm self-similarity of internet traffic
-
Uhlig, S. and Bonaventure, O. (2001) Understanding the longterm self-similarity of internet traffic. Lect. Notes Comput. Sci., 2156, 286-298.
-
(2001)
Lect. Notes Comput. Sci.
, vol.2156
, pp. 286-298
-
-
Uhlig, S.1
Bonaventure, O.2
-
33
-
-
3142512777
-
DetectingDDOS attack based on network self-similarity
-
Xiang,Y., Lin,Y., Lei,W. and Huang, S. (2004) DetectingDDOS attack based on network self-similarity. IEE Proc., Commun., 151, 292-295.
-
(2004)
IEE Proc., Commun.
, vol.151
, pp. 292-295
-
-
Xiang, Y.1
Lin, Y.2
Lei, W.3
Huang, S.4
-
34
-
-
84942256107
-
Statistical approaches to ddos attack detection and response
-
DARPA, Arlington, VA, USA Washington, DC, April 22-24
-
Feinstein, L., Schnackenberg, D., Balupari, R. and Kindred, D. (2003) Statistical Approaches to DDoS Attack Detection and Response. Proc. Information Survivability Conf. Exposition (DISCEX-III), Washington, DC, April 22-24, pp. 303-314. DARPA, Arlington, VA, USA.
-
(2003)
Proc. Information Survivability Conf. Exposition (DISCEX-III)
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
35
-
-
27144463992
-
Fractional Gaussian noise: A tool for characterizing traffic for detection purpose
-
Li, M., Chi, C.-H. and Long, D. (2004) Fractional Gaussian noise: A tool for characterizing traffic for detection purpose. Lect. Notes Comput. Sci., 3309, 94-103.
-
(2004)
Lect. Notes Comput. Sci.
, vol.3309
, pp. 94-103
-
-
Li, M.1
Chi, C.-H.2
Long, D.3
-
36
-
-
8344244591
-
Anapproach to reliably identifying signs ofDDOS flood attacks based on LRD traffic pattern recognition
-
Li, M. (2004)Anapproach to reliably identifying signs ofDDOS flood attacks based on LRD traffic pattern recognition. Comput. Secur., 23, 549-558.
-
(2004)
Comput. Secur.
, vol.23
, pp. 549-558
-
-
Li, M.1
-
37
-
-
0032167248
-
Self-similar processes in communications networks
-
Tsybakov, B. and Georganas, N. (1998) Self-similar processes in communications networks. IEEE Trans. Inf. Theory, 44, 1713-1725.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 1713-1725
-
-
Tsybakov, B.1
Georganas, N.2
-
38
-
-
0036343692
-
Detecting syn flooding attacks
-
IEEE Communications Society, NewYork, NY, USA, New York, NY, USA, June 23-27
-
Wang, H., Zhang, D. and Shin, K. (2002) Detecting SYN Flooding Attacks. Proc. INFOCOM'02, New York, NY, USA, June 23-27, pp. 1530-1539. IEEE Communications Society, NewYork, NY, USA.
-
(2002)
Proc. INFOCOM'02
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
39
-
-
18144385431
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
Dallas, TX, USA, November 29- December 3
-
Siris, V. and Papagalou, F. (2004) Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks. Proc. GLOBECOM'04, Dallas, TX, USA, November 29- December 3, pp. 2050-2054.
-
(2004)
Proc. GLOBECOM'04
, pp. 2050-2054
-
-
Siris, V.1
Papagalou, F.2
-
40
-
-
33744939733
-
Intrusion detection with CUSUM for TCP-based DDoS
-
Leu, F. and Yang, W. (2005) Intrusion detection with CUSUM for TCP-based DDoS. Lect. Notes Comput. Sci., 3823, 1255-1264.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3823
, pp. 1255-1264
-
-
Leu, F.1
Yang, W.2
-
41
-
-
24644519473
-
An automatic and generic early-bird system for internet backbone based on traffic anomaly detection
-
Gu, R., Yan, P., Zou, T. and Guo, C. (2005) An automatic and generic early-bird system for internet backbone based on traffic anomaly detection. Lect. Notes Comput. Sci., 3420, 740-748.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3420
, pp. 740-748
-
-
Gu, R.1
Yan, P.2
Zou, T.3
Guo, C.4
-
42
-
-
33646878980
-
Detecting distributed denial of service attacks using kolmogorov complexity metrics
-
Kulkarni, A. and Bush, S. (2006) Detecting distributed denial of service attacks using kolmogorov complexity metrics. J. Netw. Syst. Manage., 14, 69-80.
-
(2006)
J. Netw. Syst. Manage.
, vol.14
, pp. 69-80
-
-
Kulkarni, A.1
Bush, S.2
-
43
-
-
33744908603
-
Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation
-
Furuya, F., Matsuzaki, T. and Matsuura, K. (2005) Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation. Lect. Notes Comput. Sci., 3822, 395-406.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3822
, pp. 395-406
-
-
Furuya, F.1
Matsuzaki, T.2
Matsuura, K.3
-
44
-
-
37349125374
-
DDoS attack detection method using cluster analysis
-
Lee, K., Kim, J., Kwon, K.H., Han, Y. and Kim, S. (2008) DDoS attack detection method using cluster analysis. Expert Syst. Appl., 34, 1659-1665.
-
(2008)
Expert Syst. Appl.
, vol.34
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.H.3
Han, Y.4
Kim, S.5
-
45
-
-
17444397467
-
DDoS attack detection and wavelets
-
Li, L. and Lee, G. (2005) DDoS attack detection and wavelets. Telecommun. Syst., 28, 435-451.
-
(2005)
Telecommun. Syst.
, vol.28
, pp. 435-451
-
-
Li, L.1
Lee, G.2
-
46
-
-
35048886720
-
A novel ddos attack detecting algorithm based on the continuous wavelet transform
-
Zhen Jiang, Jiang Su, China, November 15-17
-
Yang, X., Liu, Y., Zeng, M. and Shi, Y. (2004) A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. Proc. Advanced Workshop on Content Computing (AWCC'04), Zhen Jiang, Jiang Su, China, November 15-17, pp. 173-181.
-
(2004)
Proc. Advanced Workshop on Content Computing (AWCC'04)
, pp. 173-181
-
-
Yang, X.1
Liu, Y.2
Zeng, M.3
Shi, Y.4
-
47
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
Lu,W. and Ghorbani, A.A. (2009) Network anomaly detection based on wavelet analysis. EURASIP J. Adv. Signal Process., 2009, 1-16.
-
(2009)
EURASIP J. Adv. Signal Process.
, vol.2009
, pp. 1-16
-
-
Lu, W.1
Ghorbani, A.A.2
-
48
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
Kim, S.S. and Reddy, A.L.N. (2008) Statistical techniques for detecting traffic anomalies through packet header data. IEEE/ACM Trans. Netw., 16, 562-575.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
49
-
-
38049152816
-
Detecting distributed denial of service attacks by sharing distributed belief
-
Peng, T., Leckie, C. and Ramamohanarao, K. (2003) Detecting distributed denial of service attacks by sharing distributed belief. Lect. Notes Comput. Sci., 2727, 214-225.
-
(2003)
Lect. Notes Comput. Sci.
, vol.2727
, pp. 214-225
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
50
-
-
33646131107
-
Behavior based detection of unfavourable resource
-
Cetnarowicz, K. and Rojek, G. (2004) Behavior based detection of unfavourable resource. Lect. Notes Comput. Sci., 3038, 607-614.
-
(2004)
Lect. Notes Comput. Sci.
, vol.3038
, pp. 607-614
-
-
Cetnarowicz, K.1
Rojek, G.2
-
51
-
-
77955668195
-
Modeling and simulation for detecting a distributed denial of service attack
-
Canberra, Australia, September
-
Seo, H.S. and Cho, T.H. (2002) Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Proc. Australian Joint Conf. Artificial Intelligence (AI'02), Canberra, Australia, September 16-21.
-
(2002)
Proc. Australian Joint Conf. Artificial Intelligence (AI'02)
, pp. 16-21
-
-
Seo, H.S.1
Cho, T.H.2
-
52
-
-
1242287724
-
A framework for classifying denial of service attacks
-
Karlsruhe, Germany, August 25-29 ACM, New York, NY, USA
-
Hussain, A., Heidemann, J. and Papadopoulos, C. (2003) A Framework for Classifying Denial of Service Attacks. Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'03), Karlsruhe, Germany, August 25-29, pp. 99-110. ACM, New York, NY, USA.
-
(2003)
Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'03)
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
53
-
-
21244434788
-
Self-aware networks and QoS
-
Gelenbe, E., Lent, R. and Nunez,A. (2004) Self-aware networks and QoS. Proc. IEEE, 92, 1478-1489.
-
(2004)
Proc. IEEE
, vol.92
, pp. 1478-1489
-
-
Gelenbe, E.1
Lent, R.2
Nunez, A.3
-
54
-
-
17644411571
-
Hop-count filtering an effective defense against spoofed traffic
-
Washington, DC, USA, October 27-30 ACM, New York, NY, USA
-
Jing, S., Wang, H. and Shin, K. (2003) Hop-count filtering an effective defense against spoofed traffic. Proc. Int. Conf. Computer and Communications Security (CCS'03), Washington, DC, USA, October 27-30, pp. 30-41. ACM, New York, NY, USA.
-
(2003)
Proc. Int. Conf. Computer and Communications Security (CCS'03)
, pp. 30-41
-
-
Jing, S.1
Wang, H.2
Shin, K.3
-
55
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Kim,Y., Lau,W., Chuah, M. and Chao, H. (2006) PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Dependable Secur. Comput., 3, 141-155.
-
(2006)
IEEE Trans. Dependable Secur. Comput.
, vol.3
, pp. 141-155
-
-
Kim, Y.1
Lau, W.2
Chuah, M.3
Chao, H.4
-
56
-
-
33749824252
-
ALPi: A DDoS defence system for high-speed networks
-
Ayres, P., Sun, H., Chao, H. and Lau,W. (2006) ALPi: a DDoS defence system for high-speed networks. IEEE J. Sel. Areas Commun., 24, 1864-1876.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, pp. 1864-1876
-
-
Ayres, P.1
Sun, H.2
Chao, H.3
Lau, W.4
-
57
-
-
33750013256
-
Denial of service attacks targeting a sip voip infrastructure: Attack scenarios and prevention mechanisms
-
Sisalem, D., Kuthan, J. and Ehlert, S. (2006) Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms. IEEE Netw., 20, 26-31.
-
(2006)
IEEE Netw.
, vol.20
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
58
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns andweb sites
-
Honolulu, HI, USA, May 7-11 ACM, NewYork, NY, USA
-
Jung, J., Krishnamurthy, B. and Rabinovich, M. (2002) Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs andWeb Sites. Proc. Conf. World Wide Web (WWW'02), Honolulu, HI, USA, May 7-11, pp. 553-561. ACM, NewYork, NY, USA.
-
(2002)
Proc. Conf. World Wide Web (WWW'02)
, pp. 553-561
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
59
-
-
18744376590
-
Using graphic turing tests to counter automated ddos attacks against web servers
-
ACM, New York, NY, USA, Washington, DC, USA, October 27-30
-
Morein,W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V. and Rubenstein, D. (2003) Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. Proc. Conf. Computer and Communications Security (CCS'03), Washington, DC, USA, October 27-30, pp. 8-19. ACM, New York, NY, USA.
-
(2003)
Proc. Conf. Computer and Communications Security (CCS'03)
, pp. 8-19
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
60
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
Houston, TX, USA, April 4-6 USENIX Association, Berkeley, CA, USA
-
Kandula, S., Katabi, D., Jacob, M. and Berger, A. (2005) Botz-4-sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. Proc. Symp. Networked Systems Design and Implementation (NDSI'05), Houston, TX, USA, April 4-6, pp. 287-300. USENIX Association, Berkeley, CA, USA.
-
(2005)
Proc. Symp. Networked Systems Design and Implementation (NDSI'05)
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
61
-
-
0041431049
-
Recognizing objects in adversarial clutter-breaking avisualcaptcha
-
Madison, WI, USA, June 16-22
-
Mori, G. and Malik, J. (2003) Recognizing Objects in Adversarial Clutter-Breaking aVisualCAPTCHA.Proc. Conf. ComputerVision andPattern Recognition (CVPR'03), Madison, WI, USA, June 16-22, pp. 134-141.
-
(2003)
Proc. Conf. ComputerVision AndPattern Recognition (CVPR'03)
, pp. 134-141
-
-
Mori, G.1
Malik, J.2
-
62
-
-
40949163757
-
Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests
-
Gao, Z. and Ansari, N. (2006) Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests. Commun. Lett., 10, 793-795.
-
(2006)
Commun. Lett.
, vol.10
, pp. 793-795
-
-
Gao, Z.1
Ansari, N.2
-
63
-
-
34250620174
-
Netbouncer: Client-legitimacy-based high-performance ddos filtering
-
Washington, DC, USA, April 22-24 DARPA, Arlington, VA, USA
-
Thomas, R., Mark, B., Johnson, T. and Croall, J. (2003) Netbouncer: Client-Legitimacy-Based High-Performance DDoS Filtering. Proc. Information Survivability Conf. Exposition (DISCEX-III),Washington, DC, USA, April 22-24, pp. 14-25. DARPA, Arlington, VA, USA.
-
(2003)
Proc. Information Survivability Conf. Exposition (DISCEX-III)
, pp. 14-25
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
64
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
San Diego, CA, USA, February The Internet Society,Washington, DC, USA
-
Juels, A. and Brainard, J. (1999) Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. Proc. Network and Distributed System Security Symp. (NDSS'99), San Diego, CA, USA, February, pp. 151-165. The Internet Society,Washington, DC, USA.
-
(1999)
Proc. Network and Distributed System Security Symp. (NDSS'99)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
65
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
Aura, T., Nikander, P. and Leiwo, J. (2001) DOS-resistant authentication with client puzzles. Lect. Notes Comput. Sci., 2133, 170-177.
-
(2001)
Lect. Notes Comput. Sci.
, vol.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
66
-
-
0038825046
-
Defending against denialof- service attacks with puzzle auctions
-
Washington, DC, USA IEEE Computer Society, NewYork, NY, USA
-
Wang, X. and Reiter, M.K. (2003) Defending Against Denialof- Service Attacks with Puzzle Auctions. Proc. Symp. Security and Privacy (SP'03),Washington, DC, USA, pp. 78-92. IEEE Computer Society, NewYork, NY, USA.
-
(2003)
Proc. Symp. Security and Privacy (SP'03)
, pp. 78-92
-
-
Wang, X.1
Reiter, M.K.2
-
67
-
-
47649085264
-
A multi-layer framework for puzzle-based denial-of-service defense
-
Wang, X. and Reiter, M.K. (2008) A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Secur., 7, 243-263.
-
(2008)
Int. J. Inf. Secur.
, vol.7
, pp. 243-263
-
-
Wang, X.1
Reiter, M.K.2
-
68
-
-
51349125816
-
Live baiting for service-level dos attackers
-
Dublin, Ireland, April 13-19 IEEE Communications Society, NewYork, NY, USA
-
Khattab, S., Gobriel, S., Melhem, R. and Mosse, D. (2008) Live Baiting for Service-Level DOS Attackers. Proc. INFOCOM'08, Dublin, Ireland, April 13-19, pp. 171-175. IEEE Communications Society, NewYork, NY, USA.
-
(2008)
Proc. INFOCOM'08
, pp. 171-175
-
-
Khattab, S.1
Gobriel, S.2
Melhem, R.3
Mosse, D.4
-
69
-
-
33845547636
-
A survey of autonomic communications
-
Dobson, S., Denazis, S., Fernandez, A., Gaiti, D., Gelenbe, E., Massacri, F., Nixon, P., Saffre, F., Schmidt, N. and Zambonelli, F. (2006) A survey of autonomic communications. ACM Trans. Auton. Adapt. Syst., 1, 223-259.
-
(2006)
ACM Trans. Auton. Adapt. Syst.
, vol.1
, pp. 223-259
-
-
Dobson, S.1
Denazis, S.2
Fernandez, A.3
Gaiti, D.4
Gelenbe, E.5
Massacri, F.6
Nixon, P.7
Saffre, F.8
Schmidt, N.9
Zambonelli, F.10
-
70
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson,V. and Shenker, S. (2002) Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev., 32, 62-73.
-
(2002)
ACM SIGCOMM Comput. Commun. Rev.
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
71
-
-
85180745018
-
Implementing pushback: Router-based defense against ddos attacks
-
San Diego, CA, USA, February 6-8 The Internet Society, Washington, DC, USA
-
Ioannidis, J. and Bellovin, S. (2002) Implementing Pushback: Router-Based Defense Against DDoS Attacks. Proc. Network and Distributed System Security Symp. (NDSS'02), San Diego, CA, USA, February 6-8, pp. 1-12. The Internet Society, Washington, DC, USA.
-
(2002)
Proc. Network and Distributed System Security Symp. (NDSS'02)
, pp. 1-12
-
-
Ioannidis, J.1
Bellovin, S.2
-
72
-
-
33744945767
-
SOS: Secure overlay services
-
Pittsburgh, PA, USA, August 19-23 ACM, NewYork, NY, USA
-
Keromytis, A.D., Misra, V. and Rubenstein, D. (2002) SOS: Secure Overlay Services. Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications SIGCOMM'02, Pittsburgh, PA, USA, August 19-23, pp. 61-72. ACM, NewYork, NY, USA.
-
(2002)
Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications SIGCOMM'02
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
73
-
-
2442567993
-
Mayday: Distributed dos filtering for internet services
-
Andersen, D. (2004) Mayday: Distributed DoS filtering for internet services. ACM SIGCOMM Comput. Commun. Rev., 34, 39-44.
-
(2004)
ACM SIGCOMM Comput. Commun. Rev.
, vol.34
, pp. 39-44
-
-
Andersen, D.1
-
74
-
-
84949199141
-
Mitigating distributed denial of service attacks with dynamic resource pricing
-
IEEE Computer Society, NewYork, NY, USA, Washington, DC, USA, December 10-14
-
Mankins, D., Krishnan, R., Boyd, C., Zao, J. and Frentz, M. (2001) Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Proc. Annual Computer Security Applications Conf. (ACSAC'01), Washington, DC, USA, December 10-14, pp. 411-421. IEEE Computer Society, NewYork, NY, USA.
-
(2001)
Proc. Annual Computer Security Applications Conf. (ACSAC'01)
, pp. 411-421
-
-
Mankins, D.1
Krishnan, R.2
Boyd, C.3
Zao, J.4
Frentz, M.5
-
75
-
-
7544248862
-
Mitigation of DoS attacks throughQoSregulation
-
Garg, A. and Reddy, A.N. (2004) Mitigation of DoS attacks throughQoSregulation. Microprocess. Microsyst., 28, 521-530.
-
(2004)
Microprocess. Microsyst.
, vol.28
, pp. 521-530
-
-
Garg, A.1
Reddy, A.N.2
-
76
-
-
1242350154
-
Protecting electronic commerce from distributed denial-of-service attacks
-
Honolulu, HI, USA, May 7-11 ACM, NewYork, NY, USA
-
Brustoloni, J. (2002) Protecting Electronic Commerce from Distributed Denial-of-Service Attacks. Proc. Conf. World Wide Web (WWW'02), Honolulu, HI, USA, May 7-11, pp. 553-561. ACM, NewYork, NY, USA.
-
(2002)
Proc. Conf. World Wide Web (WWW'02)
, pp. 553-561
-
-
Brustoloni, J.1
-
77
-
-
84893960790
-
Proactive server roaming for mitigating denial-of-service attacks
-
Newark, NJ, USA, August 10-13
-
Khattab, S., Sangpachatanaruk, C., Znati, T., Melhern, R. and Mosse, D. (2003) Proactive Server Roaming for Mitigating Denial-of-Service Attacks. Proc. Conf. Information Technology Research and Education (ITRE'03), Newark, NJ, USA, August 10-13, pp. 1-5.
-
(2003)
Proc. Conf. Information Technology Research and Education (ITRE'03)
, pp. 1-5
-
-
Khattab, S.1
Sangpachatanaruk, C.2
Znati, T.3
Melhern, R.4
Mosse, D.5
-
78
-
-
2442597231
-
Roaming honeypots for mitigating service- level denial-of-service attacks
-
Washington, DC, USA IEEE Computer Society, NewYork, NY, USA
-
Khattab, S., Sangpachatanaruk, C., Moss, D., Melhem, R. and Znati, T. (2004) Roaming Honeypots for Mitigating Service- Level Denial-of-Service Attacks. Proc. Int. Conf. Distributed Computing Systems (ICDCS'04), Washington, DC, USA, pp. 328-337. IEEE Computer Society, NewYork, NY, USA.
-
(2004)
Proc. Int. Conf. Distributed Computing Systems (ICDCS'04)
, pp. 328-337
-
-
Khattab, S.1
Sangpachatanaruk, C.2
Moss, D.3
Melhem, R.4
Znati, T.5
-
79
-
-
33745470948
-
Forming alliance for ddos defense
-
Centro Stefano Francini, Ascona, Switzerland
-
Mirkovic, J., Reiher, P. and Robinson, M. (2003) Forming Alliance for DDoS Defense. Proc. New Security Paradigms Workshop, Centro Stefano Francini, Ascona, Switzerland.
-
(2003)
Proc. New Security Paradigms Workshop
-
-
Mirkovic, J.1
Reiher, P.2
Robinson, M.3
-
80
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
DARPA, Arlington, VA, USA, Washington, DC, USA, April 22-24
-
Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A. and Govindan, R. (2003) COSSACK: Coordinated Suppression of Simultaneous Attacks. Proc. Information Survivability Conf. Exposition (DISCEX-III),Washington, DC, USA, April 22-24, pp. 2-13. DARPA, Arlington, VA, USA.
-
(2003)
Proc. Information Survivability Conf. Exposition (DISCEX-III)
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
81
-
-
33744524845
-
Low-rate TCPtargeted denial of service attacks and counter strategies
-
Kuzmanovic, A. and Knightly, E.W. (2006) Low-rate TCPtargeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw., 14, 683-696.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
82
-
-
17744370129
-
Low-rate TCP denial-of-service attack detection at edge routers
-
Shevtekar, A., Anantharam, K. and Ansari, N. (2005) Low-rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9, 363-365.
-
(2005)
IEEE Commun. Lett.
, vol.9
, pp. 363-365
-
-
Shevtekar, A.1
Anantharam, K.2
Ansari, N.3
-
83
-
-
33745931152
-
On the effect of router buffer sizes on low-rate denial of service attacks
-
IEEE Computer Society, Washington, DC, USA, San Diego, CA, October
-
Sarat, S. and Terzis, A. (2005) On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks. Proc. Int. Conf. Computer Communications and Networks (ICCCN'05), San Diego, CA, October 17-19. IEEE Computer Society, Washington, DC, USA.
-
(2005)
Proc. Int. Conf. Computer Communications and Networks (ICCCN'05)
, pp. 17-19
-
-
Sarat, S.1
Terzis, A.2
-
84
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
Chen, Y. and Hwang, K. (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. J. Parallel Distrib. Comput., 66, 1137-1151.
-
(2006)
J. Parallel Distrib. Comput.
, vol.66
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
85
-
-
61449207953
-
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
-
Ranjan, S.,Swaminathan, R., Uysal, M., Nucci,A. and Knightly, E. (2009) DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Trans. Netw., 17, 26-39.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
86
-
-
33745436873
-
Users and services in intelligent networks
-
Gelenbe, E. (2005) Users and services in intelligent networks. Lect. Notes Comput. Sci., 3837, 30-45.
-
(2005)
Lect. Notes Comput. Sci.
, vol.3837
, pp. 30-45
-
-
Gelenbe, E.1
-
87
-
-
0035576358
-
Measurement and performance of a cognitive packet network
-
Gelenbe, E., Lent, R. and Xu, Z. (2001) Measurement and performance of a cognitive packet network. J. Comput. Netw., 37, 691-701.
-
(2001)
J. Comput. Netw.
, vol.37
, pp. 691-701
-
-
Gelenbe, E.1
Lent, R.2
Xu, Z.3
-
89
-
-
33846630543
-
Cognitive packet networks: Qos and performance
-
IEEE, NewYork, NY, USA, Ft. Worth, TX, USA, October
-
Gelenbe, E., Lent, R., Montuori, A. and Xu, Z. (2002) Cognitive Packet Networks: QoS and Performance. Proc. IEEE Int. Symp. Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'02), Ft. Worth, TX, USA, October, pp. 3-12. IEEE, NewYork, NY, USA.
-
(2002)
Proc. IEEE Int. Symp. Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'02)
, pp. 3-12
-
-
Gelenbe, E.1
Lent, R.2
Montuori, A.3
Xu, Z.4
-
90
-
-
67650058534
-
Adaptive resilience of the cognitive packet network the presence of network worms
-
Bucharest, Romania, May NATO Research & Technology Organisation
-
Sakellari, G. and Gelenbe, E. (2009) Adaptive Resilience of the Cognitive Packet Network the Presence of Network Worms. Proc. NATO Symp. C3I for Crisis, Emergency and Consequence Management, Bucharest, Romania, May 11-12. NATO Research & Technology Organisation.
-
(2009)
Proc. NATO Symp. C3I for Crisis, Emergency and Consequence Management
, pp. 11-12
-
-
Sakellari, G.1
Gelenbe, E.2
-
91
-
-
42149108133
-
Admission of QoS aware users a smart network
-
Sakellari, G., Gelenbe, E. and D'Arienzo, M. (2008) Admission of QoS aware users a smart network. ACMTrans. Auton. Adapt. Syst., 3, 1-28.
-
(2008)
ACMTrans. Auton. Adapt. Syst.
, vol.3
, pp. 1-28
-
-
Sakellari, G.1
Gelenbe, E.2
D'Arienzo, M.3
-
92
-
-
58049174978
-
A multiple criteria, measurement-based admission control mechanism for self- aware networks
-
Hangzhou, China,August 25-27 IEEE, NewYork, NY, USA
-
Sakellari, G. and Gelenbe, E. (2008) A Multiple Criteria, Measurement-Based Admission Control Mechanism for Self- Aware Networks. Proc. Third Int. Conf. Communications and Networking China (CHINACOM'08), Hangzhou, China,August 25-27, pp. 1060-1064. IEEE, NewYork, NY, USA.
-
(2008)
Proc. Third Int. Conf. Communications and Networking China (CHINACOM'08)
, pp. 1060-1064
-
-
Sakellari, G.1
Gelenbe, E.2
-
93
-
-
17644385526
-
Defending networks against denial of service attacks
-
SPIE, BellinghamWA, USA, London, UK, October 25
-
Gelenbe, E., Gellman, M. and Loukas, G. (2004) Defending Networks Against Denial of Service Attacks. Proc. Conf. Optics/Photonics in Security and Defence (SPIE'04), London, UK, October 25,Vol. 5611, pp. 233-243. SPIE, BellinghamWA, USA.
-
(2004)
Proc. Conf. Optics/Photonics in Security and Defence (SPIE'04)
, vol.5611
, pp. 233-243
-
-
Gelenbe, E.1
Gellman, M.2
Loukas, G.3
-
94
-
-
33745444330
-
Anautonomic approach to denial of service defence
-
Taormina, Italy, June 13-16 IEEE Computer Society, NewYork, NY, USA
-
Gelenbe, E., Gellman, M. and Loukas, G. (2005)AnAutonomic Approach to Denial of Service Defence. Proc. WoWMoM Workshop on Autonomic Communications and Computing (WoWMoM/ACC'05), Taormina, Italy, June 13-16, pp. 537- 541. IEEE Computer Society, NewYork, NY, USA.
-
(2005)
Proc. WoWMoM Workshop on Autonomic Communications and Computing (WoWMoM/ACC'05)
, pp. 537-541
-
-
Gelenbe, E.1
Gellman, M.2
Loukas, G.3
-
95
-
-
33846199593
-
Self-aware approach to denial of service defence
-
Gelenbe, E. and Loukas, G. (2007) Self-aware approach to denial of service defence. Comput. Netw., 51, 1299-1314.
-
(2007)
Comput. Netw.
, vol.51
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
-
96
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
Internet Engineering Task Force, USA
-
Ferguson, P. and Senie, D. (2000) Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, Internet Engineering Task Force, USA.
-
(2000)
RFC
, pp. 2827
-
-
Ferguson, P.1
Senie, D.2
-
97
-
-
0033650584
-
Practical network support for ip traceback
-
ACM, New York, NY, USA Stockholm, Sweden, August 28-September 1
-
Savage, S., Wetherall, D., Karlin, A. and Anderson, T. (2000) Practical Network Support for IP Traceback. Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM'00), Stockholm, Sweden, August 28-September 1, pp. 295-306. ACM, New York, NY, USA.
-
(2000)
Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM'00)
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
98
-
-
0034997397
-
Advanced and authenticated marking schemes for ip traceback
-
Anchorage, AK, USA, April 22-26 IEEE Communications Society, NewYork, NY, USA
-
Song, D. and Perrig, A. (2001) Advanced and Authenticated Marking Schemes for IP Traceback. Proc. INFOCOM'01, Anchorage, AK, USA, April 22-26, pp. 878-886. IEEE Communications Society, NewYork, NY, USA.
-
(2001)
Proc. INFOCOM'01
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
99
-
-
0034775309
-
Hash-based ip traceback
-
San Diego, CA, USA, August 27-31 ACM, NewYork, NY, USA
-
Snoeren, A.C. (2001) Hash-Based IP Traceback. Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01), San Diego, CA, USA, August 27-31, pp. 3-14. ACM, NewYork, NY, USA.
-
(2001)
Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01)
, pp. 3-14
-
-
Snoeren, A.C.1
-
100
-
-
85025403958
-
An algebraic approach to IP traceback
-
Dean, D., Franklin, M. and Stubblefield, A. (2002)An algebraic approach to IP traceback. ACM Trans. Inf. Syst. Secur., 5, 119-137.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
101
-
-
0036947597
-
Single-packet IP traceback
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S.T. and Strayer, W.T. (2002) Single-packet IP traceback. IEEE/ACMTrans. Netw., 10, 721-734.
-
(2002)
IEEE/ACMTrans. Netw.
, vol.10
, pp. 721-734
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
102
-
-
84904907549
-
IP traceback-based intelligent packet filtering: A novel technique for defending against internet ddos attacks
-
IEEE Computer Society,Washington, DC, USA, Paris, France, November 12-15
-
Sung, M. and Xu, J. (2002) IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks. Proc. Int. Conf. Network Protocols (ICNP'02), Paris, France, November 12-15, pp. 302-311. IEEE Computer Society,Washington, DC, USA.
-
(2002)
Proc. Int. Conf. Network Protocols (ICNP'02)
, pp. 302-311
-
-
Sung, M.1
Xu, J.2
-
103
-
-
3042825073
-
IP traceback: A new denial-of-service deterrent?
-
Aljifri, H. (2003) IP traceback: a new denial-of-service deterrent? IEEE Secur. Priv., 1, 24-31.
-
(2003)
IEEE Secur Priv.
, vol.1
, pp. 24-31
-
-
Aljifri, H.1
-
104
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
New Orleans, LA, USA, December 3-8 USENIX Association, Berkeley, CA, USA
-
Burch, H. (2000) Tracing Anonymous Packets to their Approximate Source. Proc. Conf. System Administration (LISA'00), New Orleans, LA, USA, December 3-8, pp. 319- 328. USENIX Association, Berkeley, CA, USA.
-
(2000)
Proc. Conf. System Administration (LISA'00)
, pp. 319-328
-
-
Burch, H.1
-
105
-
-
0004304045
-
Advanced and authenticated marking schemes for ip traceback
-
University of California, Berkeley, USA
-
Song, D. and Perrig, A. (2000) Advanced and Authenticated Marking Schemes for IP Traceback. Technical Report UCB/CSD-00-1107, University of California, Berkeley, USA.
-
(2000)
Technical Report UCB/CSD-00-1107
-
-
Song, D.1
Perrig, A.2
-
107
-
-
84872786898
-
Analysis of traceback techniques
-
Safavi-Naini, R., Steketee C. and Susilo, W. (eds), Hobart, Australia
-
Tupakula, U. andVaradharajan,V. (2006) Analysis of Traceback Techniques. In Safavi-Naini, R., Steketee, C. and Susilo, W. (eds), Proc. Australasian Information SecurityWorkshop AISWNetSec' 06, Hobart, Australia, pp. 115-124.
-
(2006)
Proc. Australasian Information SecurityWorkshop AISWNetSec' 06
, pp. 115-124
-
-
Tupakula, U.1
Varadharajan, V.2
-
108
-
-
84964474589
-
Hardware support for a hash-based ip traceback
-
DARPA, Arlington, VA, USA,Anaheim, CA, June 12-14
-
Sanchez, L., Milliken, W., Snoeren, A., Tchakountio, F., Jones, C., Kent, S., Partridge, C. and Strayer, W. (2001) Hardware Support for a Hash-Based IP Traceback. Proc. Information Survivability Conf. Exposition II (DISCEX-II), Anaheim, CA, June 12-14, pp. 146-152. DARPA, Arlington, VA, USA.
-
(2001)
Proc. Information Survivability Conf. Exposition II (DISCEX-II)
, pp. 146-152
-
-
Sanchez, L.1
Milliken, W.2
Snoeren, A.3
Tchakountio, F.4
Jones, C.5
Kent, S.6
Partridge, C.7
Strayer, W.8
-
109
-
-
51649130217
-
A more practical approach for single-packet IP traceback using packet logging and marking
-
Gong, C. and Sarac, K. (2008) A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans. Parallel Distrib. Syst., 19, 1310-1324.
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, vol.19
, pp. 1310-1324
-
-
Gong, C.1
Sarac, K.2
-
110
-
-
47249087303
-
Towards stateless single-packet ip traceback
-
IEEE Computer Society, NewYork, NY, USA, Washington, DC, USA
-
Laufer, R.P., Velloso, P.B., Cunha, D., Moraes, I.M., Bicudo, M.D., Moreira, M.D. and Duarte, O. (2007) Towards Stateless Single-Packet IP Traceback. Proc. Conf. Local Computer Networks (LCN'07),Washington, DC, USA, pp. 548-555. IEEE Computer Society, NewYork, NY, USA.
-
(2007)
Proc. Conf. Local Computer Networks (LCN'07)
, pp. 548-555
-
-
Laufer, R.P.1
Velloso, P.B.2
Cunha, D.3
Moraes, I.M.4
Bicudo, M.D.5
Moreira, M.D.6
Duarte, O.7
-
111
-
-
65249176218
-
An AS-level overlay network for IP traceback
-
Castelucio, A., Salles, R. and Ziviani, A. (2009) An AS-level overlay network for IP traceback. Network (special Issue on recent developments in network intrusion detection), 23, 36-41.
-
(2009)
Network (Special Issue on Recent Developments in Network Intrusion Detection)
, vol.23
, pp. 36-41
-
-
Castelucio, A.1
Salles, R.2
Ziviani, A.3
-
112
-
-
54249125130
-
Queueing analysis for networks under dos attack
-
Perugia, Italy, June 30-July 3 Springer, Berlin/Heidelberg, Germany
-
Aissani, A. (2008) Queueing Analysis for Networks Under DoS Attack. Proc. Int. Conf. Computational Science and its Applications (ICCSA'08), Part II, Perugia, Italy, June 30-July 3, pp. 500-513. Springer, Berlin/Heidelberg, Germany.
-
(2008)
Proc. Int. Conf. Computational Science and Its Applications (ICCSA'08), Part II
, pp. 500-513
-
-
Aissani, A.1
-
113
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair servercentric router throttles
-
Yau, D., Lui, J., Liang, F. andYam,Y. (2005) Defending against distributed denial-of-service attacks with max-min fair servercentric router throttles. IEEE/ACM Trans. Netw., 13, 29-42.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, pp. 29-42
-
-
Yau, D.1
Lui, J.2
Liang, F.3
Yam, Y.4
-
114
-
-
39049161433
-
Identification of repeated denial of service attacks
-
Barcelona, Spain, April 23-29 IEEE Communications Society, NewYork, NY, USA
-
Hussain, A., Heidemann, J. and Papadopoulos, C. (2006) Identification of Repeated Denial of Service Attacks. Proc. INFOCOM'06, Barcelona, Spain, April 23-29, pp. 1-15. IEEE Communications Society, NewYork, NY, USA.
-
(2006)
Proc. INFOCOM'06
, pp. 1-15
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
|