-
1
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. L. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms, " Computer Communication Review, vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.L.2
-
2
-
-
0037956023
-
New terminology and clarifications for diffserv
-
Apr. [Online]
-
D. Grossman, "New Terminology and Clarifications for Diffserv, " RFC 3260 (Informational), Internet Engineering Task Force, Apr. 2002. [Online]. Available: http://www.ietf.orglrfc/rfc3260.txt
-
(2002)
RFC 3260 (Informational)
-
-
Grossman, D.1
-
3
-
-
77950302383
-
Multi protocol label switching architecture
-
Jan. [Online]
-
E. Rosen, A. Viswanathan, and R. Calion, "Multi protocol Label Switching Architecture, " RFC 3031 (Proposed Standard), Internet Engineering Task Force, Jan. 2001. [Online]. Available: http://www.ietf.orglrfc/ rfc3031.txt
-
(2001)
RFC 3031 (Proposed Standard)
-
-
Rosen, E.1
Viswanathan, A.2
Calion, R.3
-
4
-
-
0003260781
-
Transmission control protocol
-
Sep. [Online] updated by RFCs 1122, 3168
-
J. Postel, "Transmission Control Protocol, " RFC 793 (Standard), Internet Engineering Task Force, Sep. 1981, updated by RFCs 1122, 3168. [Online]. Available: http://www.ietf.orglrfc/rfc793.txt
-
(1981)
RFC 793 (Standard)
-
-
Postel, J.1
-
5
-
-
0004021859
-
Network calculus: A Theory of deterministic queuing systems for the internet, ser
-
Springer
-
J.-Y. L. Boudec and P. Thiran, Network Calculus: A Theory of Deterministic Queuing Systems for the Internet, ser. Lecture Notes in Computer Science. Springer, 2001, vol. 2050.
-
(2001)
Lecture Notes in Computer Science
, vol.2050
-
-
Boudec, J.-Y.L.1
Thiran, P.2
-
6
-
-
79960888325
-
TCP congestion control
-
Sep. [Online]
-
M. Allman, V. Paxson, and E. Blanton, "TCP Congestion Control, " RFC 5681 (Draft Standard), Internet Engineering Task Force, Sep. 2009. [Online]. Available: http://www.ietf.orglrfc/rfc5681.txt
-
(2009)
RFC 5681 (Draft Standard)
-
-
Allman, M.1
Paxson, V.2
Blanton, E.3
-
7
-
-
0013091507
-
Datagram congestion control protocol (DCCP)
-
Mar. , updated by RFCs 5595, 5596 . [Online]
-
E. Kohler, M. Handley, and S. Floyd, "Datagram Congestion Control Protocol (DCCP), " RFC 4340 (Proposed Standard), Internet Engineering Task Force, Mar. 2006, updated by RFCs 5595, 5596. [Online]. Available: http://www.ietf.orglrfc/rfc4340.txt
-
(2006)
RFC 4340 (Proposed Standard)
-
-
Kohler, E.1
Handley, M.2
Floyd, S.3
-
8
-
-
70449606648
-
Cubic: A new tcp-friendly highspeed tcp variant
-
July
-
H. Sangtae, R. Injong, and X. Lisong, "Cubic: a new tcp-friendly highspeed tcp variant, " SIGOP S Oper. Syst. Rev., vol. 42, pp. 64-74, July 2008.
-
(2008)
SIGOP S Oper. Syst. Rev.
, vol.42
, pp. 64-74
-
-
Sangtae, H.1
Injong, R.2
Lisong, X.3
-
9
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies, " IEEE/ACM Trans. Netw, vol. 14, no. 4, pp. 683-696, 2006.
-
(2006)
IEEE/ACM Trans. Netw
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
10
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed ddos traffic
-
C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: an effective defense against spoofed ddos traffic, " in ACM Conference on Computer and Communications Security, 2003, pp. 30-41.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
11
-
-
0003553457
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
May, updated by RFC 3704. [Online]
-
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, " RFC 2827 (Best Current Practice), Internet Engineering Task Force, May 2000, updated by RFC 3704. [Online]. Available: http://www.ietf.orglrfc/rfc2827.txt
-
(2000)
RFC 2827 (Best Current Practice)
-
-
Ferguson, P.1
Senie, D.2
-
12
-
-
70350365519
-
Lightweight opportunistic tunneling (LOT)
-
Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. P roceedings, ser., M. Backes and P. Ning, Eds., Springer
-
Y. Gilad and A. Herzberg, "Lightweight opportunistic tunneling (LOT), " in Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. P roceedings, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 104-119.
-
(2009)
Lecture Notes in Computer Science
, vol.5789
, pp. 104-119
-
-
Gilad, Y.1
Herzberg, A.2
-
13
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
The Internet Society
-
J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks, " in NDSS. The Internet Society, 2002.
-
(2002)
NDSS
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
14
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network, " SIGCOMM Comput. Commun. Rev., vol. 32, pp. 62-73, July 2002.
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
15
-
-
85050149881
-
Active internet traffic filtering: Realtime response to denial-of-service attacks
-
Berkeley, CA, USA: USENIX Association
-
K. Argyraki and D. R. Cheriton, "Active internet traffic filtering: realtime response to denial-of-service attacks, " in P roceedings of the annual conference on USENIX Annual Technical Conference, ser. ATEC '05. Berkeley, CA, USA: USENIX Association, 2005, pp. 10-10.
-
(2005)
Proceedings of the Annual Conference on USENIX Annual Technical Conference, Ser. ATEC '05
, pp. 10-10
-
-
Argyraki, K.1
Cheriton, D.R.2
-
16
-
-
65249149520
-
To filter or to authorize: Networklayer DoS defense against multimillion-node botnets
-
Seattle, WA, USA, August 17-22, 2008, V. Bahl, D. Wetherall, S. Savage, and I. Stoica, Eds. ACM
-
X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: networklayer DoS defense against multimillion-node botnets, " in P roceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and P rotocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008, V. Bahl, D. Wetherall, S. Savage, and I. Stoica, Eds. ACM, 2008, pp. 195-206.
-
(2008)
P Roceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and P Rotocols for Computer Communications
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
17
-
-
33750308365
-
A DoS-limiting network architecture
-
P hiladelphia, Pennsylvania, USA, August 22-26, 2005, R. Guerin, R. Govindan, and G. Minshall, Eds. ACM
-
X. Yang, D. Wetherall, and T. E. Anderson, "A DoS-limiting network architecture, " in P roceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and P rotocols for Computer Communications, P hiladelphia, Pennsylvania, USA, August 22-26, 2005, R. Guerin, R. Govindan, and G. Minshall, Eds. ACM, 2005, pp. 241-252.
-
(2005)
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and P Rotocols for Computer Communications
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.E.3
-
18
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
IEEE Computer Society
-
A. Yaar, A. Perrig, and D. X. Song, "SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, " in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004, p. 130.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 130
-
-
Yaar, A.1
Perrig, A.2
Song, D.X.3
-
19
-
-
0742269306
-
SOS: An architecture for mitigating DDoS attacks
-
A. D. Keromytis, V. Misra, and D. Rubenstein, "SOS: an architecture for mitigating DDoS attacks, " IEEE Journal on Selected Areas in Communications, vol. 22, no. 1, pp. 176-188, 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 176-188
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
21
-
-
85094665335
-
Phalanx: Withstanding multimillion-node botnets
-
April 16-18, San Francisco, CA, USA, P roceedings, J. Crowcroft and M. Dahlin, Eds. USENIX Association, 2008
-
C. Dixon, T. E. Anderson, and A. Krishnamurthy, "Phalanx: Withstanding multimillion-node botnets, " in 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008, April 16-18, 2008, San Francisco, CA, USA, P roceedings, J. Crowcroft and M. Dahlin, Eds. USENIX Association, 2008, pp. 45-58.
-
(2008)
5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008
, pp. 45-58
-
-
Dixon, C.1
Anderson, T.E.2
Krishnamurthy, A.3
-
22
-
-
27644518127
-
D-ward: A source-end defense against flooding denial-of-service attacks
-
J. Mirkovic and P. L. Reiher, "D-ward: A source-end defense against flooding denial-of-service attacks, " IEEE Trans. Dependable Sec. Comput., vol. 2, no. 3, pp. 216-232, 2005.
-
(2005)
IEEE Trans. Dependable Sec. Comput.
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.L.2
-
23
-
-
72449130431
-
Proactive surge protection: A defense mechanism for bandwidth-based attacks
-
Dec.
-
J. C.-Y. Chou, B. Lin, S. Sen, and O. Spatscheck, "Proactive surge protection: a defense mechanism for bandwidth-based attacks, " IEEE/ ACM Transactions on Networking, vol. 17, no. 6, pp. 1711-1723, Dec. 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.6
, pp. 1711-1723
-
-
Chou, J.C.-Y.1
Lin, B.2
Sen, S.3
Spatscheck, O.4
-
24
-
-
69249123696
-
DFence: Transparent network-based denial of service mitigation
-
A. Mahimkar, J. Dange, V. Shmatikov, H. M. Yin, and Y. Zhang, "dFence: Transparent network-based denial of service mitigation, " in NSDI. USENIX, 2007.
-
(2007)
NSDI. USENIX
-
-
Mahimkar, A.1
Dange, J.2
Shmatikov, V.3
Yin, H.M.4
Zhang, Y.5
-
25
-
-
34648867936
-
A framework for a collaborative DDoS defense
-
G. C. Oikonomou, J. Mirkovic, P. L. Reiher, and M. Robinson, "A framework for a collaborative DDoS defense, " in ACSAG. IEEE Computer Society, 2006, pp. 33-42.
-
(2006)
ACSAG. IEEE Computer Society
, pp. 33-42
-
-
Oikonomou, G.C.1
Mirkovic, J.2
Reiher, P.L.3
Robinson, M.4
-
26
-
-
33750366503
-
DDoS defense by offense
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. R. Karger, and S. Shenker, "DDoS defense by offense, " in SIGCOMM, 2006, pp. 303-314.
-
(2006)
SIGCOMM
, pp. 303-314
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.R.4
Shenker, S.5
|