-
1
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France, November
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the Source, " Proceedings of ICNP 2002, pp. 312-321, Paris, France, November 2002.
-
(2002)
Proceedings of ICNP 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
2
-
-
24344471722
-
A practical method to counteract denial of service attacks
-
Adelaide, Australia
-
U. Tupakula and V. Varadharajan, "A Practical Method to Counteract Denial of Service Attacks, " In Proceedings of ACSC'03, pp. 275-284, Adelaide, Australia, 2003.
-
(2003)
Proceedings of ACSC'03
, pp. 275-284
-
-
Tupakula, U.1
Varadharajan, V.2
-
3
-
-
78049513091
-
Analysis of a general probabilistic packet marking model for IP traceback
-
L. Lu, M. Chan, and E. Chang, "Analysis of a General Probabilistic Packet Marking Model for IP Traceback, " In Proceedings of ASIACCS'08, 2008.
-
(2008)
Proceedings of ASIACCS'08
-
-
Lu, L.1
Chan, M.2
Chang, E.3
-
4
-
-
0242314805
-
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver, "The Spread of the Sapphire/Slammer Worm", http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
-
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
6
-
-
61449207953
-
DDoS-Shield: DDoSResilient scheduling to counter application layer atttacks
-
Feb.
-
S. Ranjan, R. Swaminathan, M. Uysal, et al., "DDoS-Shield: DDoSResilient Scheduling to Counter Application Layer Atttacks, " IEEE/ACM Transactions on Networking, vol. 7, no. 1, Feb. 2009, pp. 26-39.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
-
8
-
-
84868307433
-
A lightweight mechanism to mitigate application layer DDoS attacks
-
Hong Kong, China, June 10-11
-
J. Yu, C. Fang, L. Lu, and Z. Li, "A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks, " The 4th International ICST Conference on Scalable Information Systems (INFOSCALE'09), Hong Kong, China, June 10-11, 2009.
-
(2009)
The 4th International ICST Conference on Scalable Information Systems (INFOSCALE'09)
-
-
Yu, J.1
Fang, C.2
Lu, L.3
Li, Z.4
-
9
-
-
47349116678
-
Detection of HTTP-GET flood attack based on analysis of page access behavior
-
T. Yatagai, T. Isohara, and I. Sasase, "Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior, " Proc. PACRIM'07, 2007, pp. 232-235.
-
(2007)
Proc. PACRIM'07
, pp. 232-235
-
-
Yatagai, T.1
Isohara, T.2
Sasase, I.3
-
11
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Y. Xie and S. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites, " IEEE/ACM Transactions on Networking, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
12
-
-
61449197774
-
A large-scale Hidden Semi-Markov model for anomaly detection on user browsing behaviors
-
Y. Xie and S. Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors, " IEEE/ACM Transactions on Networking, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
15
-
-
33645692161
-
Measurement and analysis of HTTP traffic
-
Dec.
-
Y. Bhole and A. Popescu, "Measurement and Analysis of HTTP Traffic, " Journal of Network and Systems Management, vol. 13, no. 4, Dec. 2005, pp. 357-371.
-
(2005)
Journal of Network and Systems Management
, vol.13
, Issue.4
, pp. 357-371
-
-
Bhole, Y.1
Popescu, A.2
-
17
-
-
78049493990
-
July, 2009 South Korea and US DDoS attacks
-
Arbor Networks ASERT Team, AR, July 10
-
Arbor Networks ASERT Team, "July, 2009 South Korea and US DDoS Attacks, " ARBOR Networks, July 10, 2009.
-
(2009)
BOR Networks
-
-
-
18
-
-
60349130960
-
BlackEnergy DDoS bot anaysis
-
Oct.
-
J. Nazario, "BlackEnergy DDoS Bot Anaysis, " ARBOR Networks, Oct. 2007.
-
(2007)
ARBOR Networks
-
-
Nazario, J.1
-
19
-
-
84896850886
-
A study on the analysis of netbot and design of detection framework
-
K. Han, E. Im, "A Study on the Analysis of Netbot and Design of Detection Framework, " In Proceedings of JWIS 2009, 2009.
-
(2009)
Proceedings of JWIS 2009
-
-
Han, K.1
Im, E.2
|