-
1
-
-
29244475815
-
Internet denial of service: attack and defense mechanisms
-
Prentice-Hall PTR
-
Mirkovic, J. Dietrich, S. Dittrich, D. Reiher, P.: 'Internet denial of service: attack and defense mechanisms', (Prentice-Hall PTR 2004)
-
(2004)
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
2
-
-
33845591142
-
DDoS-resilient scheduling to counter application layer attacks under imperfect detection
-
Ranjan, S. Swaminathan, R. Uysal, M. Knightly, E.: 'DDoS-resilient scheduling to counter application layer attacks under imperfect detection', Proc. INFOCOM'06, 2006
-
(2006)
Proc. INFOCOM'06
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
3
-
-
47149094655
-
A Detection and offense mechanism to defend against application layer DDoS attacks
-
Yu, J. Li, Z. Chen, H. Chen, X.: 'A Detection and offense mechanism to defend against application layer DDoS attacks', Proc. ICNS'07, 2007
-
(2007)
Proc. ICNS'07
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
4
-
-
25844492549
-
On the effectiveness of DDoS attacks on statistical filtering
-
Li, Q. Chang, E. Chan, M.: 'On the effectiveness of DDoS attacks on statistical filtering', Proc. INFOCOM'05, 2005
-
(2005)
Proc. INFOCOM'05
-
-
Li, Q.1
Chang, E.2
Chan, M.3
-
6
-
-
70450210296
-
Effective metric for detecting distributed denial-of-service attacks based on information divergence
-
Li, K. Zhou, W. Yu, S.: 'Effective metric for detecting distributed denial-of-service attacks based on information divergence', IET Commun., 2009, 3, (12), p. 1851-1860
-
(2009)
IET Commun.
, vol.3
, Issue.12
, pp. 1851-1860
-
-
Li, K.1
Zhou, W.2
Yu, S.3
-
8
-
-
24344471722
-
A practical method to counteract denial of service attacks
-
Tupakula, U. Varadharajan, V.: 'A practical method to counteract denial of service attacks', Proc. ACSC'03, 2003
-
(2003)
Proc. ACSC'03
-
-
Tupakula, U.1
Varadharajan, V.2
-
9
-
-
78049513091
-
Analysis of a general probabilistic packet marking model for IP traceback
-
Lu, L. Chan, M. Chang, E.: 'Analysis of a general probabilistic packet marking model for IP traceback', Proc. ASIACCS'08, 2008
-
(2008)
Proc. ASIACCS'08
-
-
Lu, L.1
Chan, M.2
Chang, E.3
-
10
-
-
0041817284
-
CenterTrack: an IP overlay network for tracking DoS floods
-
Stone, R.: 'CenterTrack: an IP overlay network for tracking DoS floods', Proc. Ninth Usenix Sec. Symp., 2002
-
(2002)
Proc. Ninth Usenix Sec. Symp.
-
-
Stone, R.1
-
11
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
1045-9219
-
Chen, Y. Hwang, K. Ku, W.: 'Collaborative detection of DDoS attacks over multiple network domains', IEEE Trans. Parallel Distrib. Syst., 2007, 2, (3), p. 1-49, 1045-9219
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.2
, Issue.3
, pp. 1-49
-
-
Chen, Y.1
Hwang, K.2
Ku, W.3
-
12
-
-
3142512777
-
Detecting DDOS attack based on network self-similarity
-
1350-2425
-
Xiang, Y. Lin, Y. Lei, W.L. Huang, S.J.: 'Detecting DDOS attack based on network self-similarity', IEE Proc. Commun., 2004, 151, (3), p. 292-295, 1350-2425
-
(2004)
IEE Proc. Commun.
, vol.151
, Issue.3
, pp. 292-295
-
-
Xiang, Y.1
Lin, Y.2
Lei, W.L.3
Huang, S.J.4
-
14
-
-
60649112960
-
Misusing unstructured P2P systems to perform DoS attacks: the network that never forgets
-
Athanasopoulos, E. Anagnostakis, K. Markatos, E.: 'Misusing unstructured P2P systems to perform DoS attacks: the network that never forgets', Proc. ACNS'06, 2006
-
(2006)
Proc. ACNS'06
-
-
Athanasopoulos, E.1
Anagnostakis, K.2
Markatos, E.3
-
16
-
-
60649116060
-
Misusing Kademlia protocol to perform DDoS attacks
-
Yu, J. Li, Z. Chen, X.: 'Misusing Kademlia protocol to perform DDoS attacks', Proc. ISPA'08, 2008
-
(2008)
Proc. ISPA'08
-
-
Yu, J.1
Li, Z.2
Chen, X.3
-
17
-
-
47749130236
-
DDoS Defense by offense
-
Walfish, M. Vutukuru, M. Balakrishnan, H. Karger, D. Shenker, S.: 'DDoS Defense by offense', Proc. SIGCOMM'06, 2006
-
(2006)
Proc. SIGCOMM'06
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
18
-
-
51349125816
-
Live baiting for service-level DoS attackers
-
Khattab, S. Gobriel, S. Melhem, R. Mosse, D.: 'Live baiting for service-level DoS attackers', Proc. INFOCOM'08, 2008
-
(2008)
Proc. INFOCOM'08
-
-
Khattab, S.1
Gobriel, S.2
Melhem, R.3
Mosse, D.4
-
19
-
-
47249148481
-
Mitigating application-level denial of service attacks on web servers: a client-transparent approach
-
Srivatsa, M. Iyengar, A. Yin, J. Liu, L.: 'Mitigating application-level denial of service attacks on web servers: a client-transparent approach', ACM Trans. Web, 2008, 18, (12), p. 1649-1662
-
(2008)
ACM Trans. Web
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
20
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
1063-6692
-
Xie, Y. Yu, S.: 'Monitoring the application-layer DDoS attacks for popular websites', IEEE/ACM Trans. Netw., 2009, 17, (1), p. 15-25, 1063-6692
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.2
-
21
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
1063-6692
-
Xie, Y. Yu, S.: 'A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors', IEEE/ACM Trans. Netw., 2009, 17, (1), p. 54-65, 1063-6692
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.2
-
23
-
-
77953066525
-
Choosing reputable servents in a P2P network
-
Cornelli, F. Damiani, E. Vimercati, S. Paraboschi, S. Samarati, P.: 'Choosing reputable servents in a P2P network', Proc. WWW'02, 2002
-
(2002)
Proc. WWW'02
-
-
Cornelli, F.1
Damiani, E.2
Vimercati, S.3
Paraboschi, S.4
Samarati, P.5
-
24
-
-
33646831908
-
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
-
Srivatsa, M. Xiong, L. Liu, L.: 'TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks', Proc. WWW'05, 2005
-
(2005)
Proc. WWW'05
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
26
-
-
85127665852
-
Web server workload characterization: the search for invariants
-
Arlitt, M. Williamson, C.: 'Web server workload characterization: the search for invariants', Proc. ACM SIGMETRICS'96, 1996
-
(1996)
Proc. ACM SIGMETRICS'96
-
-
Arlitt, M.1
Williamson, C.2
-
27
-
-
77954321139
-
Fine-grained capabilities for flooding DDoS defense using client reputations
-
Natu, M. Mirkovic, J.: 'Fine-grained capabilities for flooding DDoS defense using client reputations', Proc. LSAD'07, 2007
-
(2007)
Proc. LSAD'07
-
-
Natu, M.1
Mirkovic, J.2
-
29
-
-
18744376590
-
Using graphical turing tests to counter automated DDoS attacks against web servers
-
Morein, W.G. Stavrou, A. Cook, D.L. Keromytis, A.D. Misra, V. Rubenstein, D.: 'Using graphical turing tests to counter automated DDoS attacks against web servers', Proc. ACM CCS'03, 2003
-
(2003)
Proc. ACM CCS'03
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
30
-
-
78149456339
-
A lightweight mechanism to mitigate application layer DDoS attacks
-
Yu, J. Fang, C. Lu, L. Li, Z.: 'A lightweight mechanism to mitigate application layer DDoS attacks', Proc. Infoscale'09, 2009
-
(2009)
Proc. Infoscale'09
-
-
Yu, J.1
Fang, C.2
Lu, L.3
Li, Z.4
|