-
2
-
-
79953314654
-
-
Barlow J., "TFN2K: An Analysis," http://packetstormsecurity. org/distributed/TFN2K -Analysis-1.3.txt, 2007.
-
(2007)
TFN2K: An Analysis
-
-
Barlow, J.1
-
3
-
-
31544436627
-
Denial of service attack detection techniques
-
Carl G., Kesidis G., Brooks R., and Rai S., "Denial of Service Attack Detection Techniques," Computer Journal of IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, 2006.
-
(2006)
Computer Journal of IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
4
-
-
0036804084
-
Defending against flooding-based distributed denial of service attacks: A tutorial
-
Chang C., "Defending Against Flooding-Based Distributed Denial of Service Attacks: A Tutorial," Computer Journal of IEEE Communication Magazine, vol. 40, no. 10, pp. 42-51, 2002.
-
(2002)
Computer Journal of IEEE Communication Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, C.1
-
5
-
-
34247601459
-
A divide and conquer strategy for thwarting distributed denial of service attacks
-
Chen R., Park J., and Marchany R., "A Divide and Conquer Strategy for Thwarting Distributed Denial of Service Attacks," Computer Journal of IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588, 2007.
-
(2007)
Computer Journal of IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 577-588
-
-
Chen, R.1
Park, J.2
Marchany, R.3
-
11
-
-
0006935026
-
-
Dittrich D., Weaver G., Dietric S., and Long N., "The Mstream Distributed Denial of Service Attack Tool," http://staff. washington.edu /dittrich/misc.mstream.analysis.txt, 2007.
-
(2007)
The Mstream Distributed Denial of Service Attack Tool
-
-
Dittrich, D.1
Weaver, G.2
Dietric, S.3
Long, N.4
-
15
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state of the art
-
Douligeris C. and Mitrokotsa A., "DDoS Attacks and Defense Mechanisms: Classification and State of the Art," Computer Journal of Networks, vol. 44, no. 5, pp. 643-666, 2004.
-
(2004)
Computer Journal of Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
17
-
-
0002000920
-
Denial of service attacks rip the internet
-
Garber L., "Denial of Service Attacks Rip the Internet," Computer Journal of IEEE, vol. 33, no. 4, pp. 12-17, 2000.
-
(2000)
Computer Journal of IEEE
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
20
-
-
3242808612
-
-
CSI Publications
-
Gordon A., Loeb P., Lucysgyn W., and Richardson R., CSI/FBI Computer Crime and Security Survey, CSI Publications, 2006.
-
(2006)
CSI/FBI Computer Crime and Security Survey
-
-
Gordon, A.1
Loeb, P.2
Lucysgyn, W.3
Richardson, R.4
-
22
-
-
0032645074
-
TCP/IP security threats and attack methods
-
Haris B. and Hunt R., "TCP/IP Security Threats and Attack Methods," Computer Journal of Communications Review, vol. 22, no. 10, pp. 885-897, 1999.
-
(1999)
Computer Journal of Communications Review
, vol.22
, Issue.10
, pp. 885-897
-
-
Haris, B.1
Hunt, R.2
-
23
-
-
79953327872
-
-
Haymarket Media
-
Haymarket Media, "Al-Jazeera Hacked in DoS Attack," http://www. itnews. com.au /newsstory. aspx?CIaNID=l 7603, 2007.
-
(2007)
Al-Jazeera Hacked in DoS Attack
-
-
-
27
-
-
79953297047
-
-
McAfee, "Personal Firewall," http://www. mcafee.com, 2003.
-
(2003)
Personal Firewall
-
-
-
28
-
-
79953299297
-
-
39024655, 39121278, 00.htm
-
McCue A., "Bookie Reveals," http://software .silicon.com/ security/0, 39024655, 39121278, 00.htm, 2007.
-
(2007)
Bookie Reveals
-
-
McCue, A.1
-
29
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Mirkovic J. and Reiher P., "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," Computer Journal of ACM SIGCOMM, vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
Computer Journal of ACM SIGCOMM
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
30
-
-
58349099401
-
Benchmarks for DDOS defense evaluation
-
Washington
-
Mirkovic J., Arikan E., Wei S., Thomas R., Fahmy S., and Reiher P., "Benchmarks for DDOS Defense Evaluation," in Proceedings of Military Communications Conference, pp. 1-10, Washington, 2006.
-
(2006)
Proceedings of Military Communications Conference
, pp. 1-10
-
-
Mirkovic, J.1
Arikan, E.2
Wei, S.3
Thomas, R.4
Fahmy, S.5
Reiher, P.6
-
33
-
-
33745205813
-
Inferring internet denial of service activity
-
Moore D., Shannon C., Brown D., Voelker G., and Savage S., "Inferring Internet Denial of Service Activity," Computer Journal of ACM Transactions, vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
Computer Journal of ACM Transactions
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.3
Voelker, G.4
Savage, S.5
-
35
-
-
0031140709
-
Internet Security: Firewalls and beyond
-
Oppliger R., "Internet Security: Firewalls and Beyond," Computer Journal of Communications of the ACM, vol. 40, no. 2, pp. 92-102, 1997.
-
(1997)
Computer Journal of Communications of the ACM
, vol.40
, Issue.2
, pp. 92-102
-
-
Oppliger, R.1
-
36
-
-
34147099073
-
Survey of network based defense mechanisms countering the DoS and DDoS problems
-
Peng T., Leckie C., and Ramamohanarao K., "Survey of Network Based Defense Mechanisms Countering the DoS and DDoS Problems," Computer Journal of ACM Computing Surveys, vol. 39, no. 1, pp. 123-128, 2007.
-
(2007)
Computer Journal of ACM Computing Surveys
, vol.39
, Issue.1
, pp. 123-128
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
37
-
-
47649083043
-
Challenges and principles of DDoS defense
-
Robinson M., Mirkovic J., Schnaider M., Michel S., and Reiher P., "Challenges and Principles of DDoS Defense," Computer Journal of ACM SIGCOMM, vol. 5, no. 2, pp. 148-152, 2003.
-
(2003)
Computer Journal of ACM SIGCOMM
, vol.5
, Issue.2
, pp. 148-152
-
-
Robinson, M.1
Mirkovic, J.2
Schnaider, M.3
Michel, S.4
Reiher, P.5
|