-
1
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
L. Garber, "Denial-of-service attacks rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, 2000.
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
2
-
-
85084161590
-
Political DDoS: Estonia and beyond
-
J. Nazario, "Political DDoS: Estonia and Beyond ," in Invited Talk, in 17th USENIX Security Symposium, July 28-Aug 1, 2008, San Jose, CA, USA, 2008.
-
(2008)
Invited Talk, in 17th USENIX Security Symposium, July 28-Aug 1, 2008, San Jose, CA, USA
-
-
Nazario, J.1
-
3
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
DOI 10.1109/MCOM.2002.1039856
-
R. Chang, "Defending against flooding-based distributed denial-of service attacks: A tutorial," Communications Magazine, IEEE, vol. 40, no. 10, pp. 42-51, 2002. (Pubitemid 35311945)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
5
-
-
80455166416
-
Net video not yet ready for prime time
-
J. Borland, "Net video not yet ready for prime time," CNET News. com. February, vol. 5, 1999.
-
(1999)
CNET News. Com. February
, vol.5
-
-
Borland, J.1
-
6
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
ACM
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," in Proceedings of the 11th international conference on World Wide Web, pp. 293-304, ACM, 2002.
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
9
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," ACM SIGCOMM Computer Communication Review, vol. 32, no. 3, p. 73, 2002.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, Issue.3
, pp. 73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
12
-
-
77950587483
-
Research on the active DDoS filtering algorithm based on IP Flow
-
Yifu Feng, Rui Guo, Dongqi Wang, and Z. Bencheng, "Research on the Active DDoS Filtering Algorithm Based on IP Flow," in Proceedings of the 2009 Fifth International Conference on Natural Computation, 2009.
-
(2009)
Proceedings of the 2009 Fifth International Conference on Natural Computation
-
-
Feng, Y.1
Guo, R.2
Wang, D.3
Bencheng, Z.4
-
13
-
-
34548183355
-
A distributed approach using entropy to detect DDoS attacks in ISP domain
-
DOI 10.1109/ICSCN.2007.350758, 4156640, Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
-
K. Kumar, R. Joshi, and K. Singh, "A distributed approach using entropy to detect DDoS attacks in ISP domain," in Signal Processing, Communications and Networking, 2007. ICSCN'07. International Conference on, pp. 331-337, IEEE, 2007. (Pubitemid 47304132)
-
(2007)
Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
14
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
IEEE
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in DARPA Information Survivability Conference and Exposition, 2003. Proceedings, vol. 1, pp. 303-314, IEEE, 2003.
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
15
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based IP filtering
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Protection from distributed denial of service attacks using history-based IP filtering," in IEEE International Conference on Communications, 2003. ICC'03, pp. 482-486, 2003.
-
(2003)
IEEE International Conference on Communications, 2003. ICC'03
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
16
-
-
84867971022
-
Use of ip addresses for high rate flooding attack detection
-
E. Ahmed, G. Mohay, A. Tickle, and S. Bhatia, "Use of ip addresses for high rate flooding attack detection," in Proceedings of 25th International Information Security Conference (SEC 2010) : Security & Privacy : Silver Linings in the Cloud, Brisbane, Australia, 2010.
-
(2010)
Proceedings of 25th International Information Security Conference (SEC 2010) : Security & Privacy : Silver Linings in the Cloud, Brisbane, Australia
-
-
Ahmed, E.1
Mohay, G.2
Tickle, A.3
Bhatia, S.4
-
17
-
-
0013264090
-
Proactive intrusion detection and distributed denial of service attacks: A case study in security management
-
J. Cabrera, L. Lewis, X. Qin, W. Lee, and R. Mehra, "Proactive intrusion detection and distributed denial of service attacks: A case study in security management," Journal of Network and Systems Management, vol. 10, no. 2, pp. 225-254, 2002.
-
(2002)
Journal of Network and Systems Management
, vol.10
, Issue.2
, pp. 225-254
-
-
Cabrera, J.1
Lewis, L.2
Qin, X.3
Lee, W.4
Mehra, R.5
-
19
-
-
84954358597
-
Traffic flooding attack detection with SNMP MIB using SVM
-
J. Yu, H. Lee, M. Kim, and D. Park, "Traffic flooding attack detection with SNMP MIB using SVM," Computer Communications, vol. 31, no. 17, pp. 4212-4219, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 4212-4219
-
-
Yu, J.1
Lee, H.2
Kim, M.3
Park, D.4
-
20
-
-
2942728016
-
Telling humans and computers apart automatically
-
L. Von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Communications of the ACM, vol. 47, no. 2, pp. 56-60, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
21
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
USENIX Association
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds," in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2, pp. 287-300, USENIX Association, 2005.
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, vol.2
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
23
-
-
56649106403
-
Distinguishing between FE and DDoS using randomness check
-
H. Park, P. Li, D. Gao, H. Lee, and R. Deng, "Distinguishing between FE and DDoS Using Randomness Check," Information Security, pp. 131-145, 2008.
-
(2008)
Information Security
, pp. 131-145
-
-
Park, H.1
Li, P.2
Gao, D.3
Lee, H.4
Deng, R.5
-
24
-
-
37249046628
-
Detecting shrew HTTP flood attacks for flash crowds
-
Computational Science - ICCS 2007 - 7th International Conference, Proceedings, Part I
-
Y. Xie and S. Yu, "Detecting Shrew HTTP Flood Attacks for Flash Crowds," Computational Science-ICCS 2007, pp. 640-647, 2007. (Pubitemid 350269702)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4487
, pp. 640-647
-
-
Xie, Y.1
Yu, S.-Z.2
-
25
-
-
8344224137
-
Low-rate TCP-targeted denial of service attacks: The shrew vs. The mice and elephants
-
ACM
-
A. Kuzmanovic and E. Knightly, "Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants," in Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, p. 86, ACM, 2003.
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 86
-
-
Kuzmanovic, A.1
Knightly, E.2
-
26
-
-
34548812317
-
Methods of distinguishing flash crowds from spoofed DoS attacks
-
DOI 10.1109/NGI.2007.371212, 4231835, NGI 2007: 2007 Next Generation Internet Networks - 3rd EuroNGI Conference on Next Generation Internet Networks: Design and Engineering for Heterogeneity
-
Q. Le, M. Zhanikeev, and Y. Tanaka, "Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks," in Next Generation Internet Networks, 3rd EuroNGI Conference on, pp. 167-173, IEEE, 2007. (Pubitemid 47439984)
-
(2007)
NGI 2007: 2007 Next Generation Internet Networks - 3rd EuroNGI Conference on Next Generation Internet Networks: Design and Engineering for Heterogeneity
, pp. 167-173
-
-
Le, T.Q.1
Zhanikeev, M.2
Tanaka, Y.3
-
27
-
-
72849125444
-
Discriminating DDoS flows from flash crowds using information distance
-
IEEE
-
S. Yu, T. Thapngam, J. Liu, S. Wei, and W. Zhou, "Discriminating DDoS Flows from Flash Crowds Using Information Distance," in Network and System Security, 2009. NSS'09. Third International Conference on, pp. 351-356, IEEE, 2009.
-
(2009)
Network and System Security, 2009. NSS'09. Third International Conference on
, pp. 351-356
-
-
Yu, S.1
Thapngam, T.2
Liu, J.3
Wei, S.4
Zhou, W.5
-
28
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
USENIX Association
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, p. 5, USENIX Association, 2007.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 5
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
29
-
-
0033651981
-
On network-aware clustering of web clients
-
ACM
-
B. Krishnamurthy and J. Wang, "On network-aware clustering of web clients," in Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 97-110, ACM, 2000.
-
(2000)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 97-110
-
-
Krishnamurthy, B.1
Wang, J.2
|