-
1
-
-
84877726988
-
Understanding the efficacy of deployed internet source address validation filtering
-
ACM
-
R. Beverly, A. Berger and Y. Hyun, "Understanding the efficacy of deployed internet source address validation filtering," Proc. the 9th ACM SIGCOMM conference on Internet measurement conference, ACM, 2009, pp. 356-369.
-
(2009)
Proc. the 9th ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 356-369
-
-
Beverly, R.1
Berger, A.2
Hyun, Y.3
-
2
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets," Proc. ACM SIGCOMM Computer Communication Review, 2001, pp. 15-26.
-
Proc. ACM SIGCOMM Computer Communication Review, 2001
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
4
-
-
85083279650
-
Passport: Secure and adoptable source authentication
-
USENIX Association
-
X. Liu, A. Li, X. Yang and D. Wetherall, "Passport: Secure and adoptable source authentication," Proc. USENIX/ACM Symposium on Networked Systems Design and Implementation, USENIX Association, 2008, pp. 365-378.
-
(2008)
Proc. USENIX/ACM Symposium on Networked Systems Design and Implementation
, pp. 365-378
-
-
Liu, X.1
Li, A.2
Yang, X.3
Wetherall, D.4
-
5
-
-
0003976889
-
Trends in denial of service attack technology
-
Series Trends in denial of service attack technology
-
K.J. Houle, G.M. Weaver, N. Long and R. Thomas, "Trends in denial of service attack technology," Book Trends in denial of service attack technology, Series Trends in denial of service attack technology, 2001.
-
(2001)
Book Trends in Denial of Service Attack Technology
-
-
Houle, K.J.1
Weaver, G.M.2
Long, N.3
Thomas, R.4
-
9
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
DOI 10.1145/505659.505664
-
V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," ACM SIGCOMM Computer Communication Review, vol. 31, no. 3, 2001, pp. 38-47. (Pubitemid 33586487)
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
10
-
-
84055206144
-
Worldwide infrastructure security report
-
D. Roland and M. Carlos, "Worldwide infrastructure security report,"Arbor Networks, vol. VI, 2010.
-
(2010)
Arbor Networks
, vol.6
-
-
Roland, D.1
Carlos, M.2
-
13
-
-
54749133714
-
-
RFC5210, June
-
J. Wu, J. Bi, X. Li, G. Ren, K. Xu and M. Williams, "A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience,"RFC5210, June, 2008.
-
(2008)
A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience
-
-
Wu, J.1
Bi, J.2
Li, X.3
Ren, G.4
Xu, K.5
Williams, M.6
-
14
-
-
34748852577
-
-
ACM
-
H. Lee, M. Kwon, G. Hasker and A. Perrig, "BASE: An incrementally deployable mechanism for viable IP spoofing prevention," ACM, 2007, pp. 20-31.
-
(2007)
BASE: An Incrementally Deployable Mechanism for Viable IP Spoofing Prevention
, pp. 20-31
-
-
Lee, H.1
Kwon, M.2
Hasker, G.3
Perrig, A.4
-
16
-
-
67651124925
-
Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
-
J. Bi, B. Liu, J. Wu and Y. Shen, "Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method," Tsinghua Science & Technology, vol. 14, no. 4, 2009, pp. 413-422.
-
(2009)
Tsinghua Science & Technology
, vol.14
, Issue.4
, pp. 413-422
-
-
Bi, J.1
Liu, B.2
Wu, J.3
Shen, Y.4
-
17
-
-
0036349004
-
-
Citeseer
-
J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang, "SAVE: Source address validity enforcement protocol," Citeseer, 2002, pp. 1557-1566.
-
(2002)
SAVE: Source Address Validity Enforcement Protocol
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
18
-
-
70349754408
-
On the state of IP spoofing defense
-
T. Ehrenkranz and J. Li, "On the state of IP spoofing defense," ACM Transactions on Internet Technology (TOIT), vol. 9, no. 2, 2009, pp. 6.
-
(2009)
ACM Transactions on Internet Technology (TOIT)
, vol.9
, Issue.2
, pp. 6
-
-
Ehrenkranz, T.1
Li, J.2
-
19
-
-
0010020069
-
-
Springer
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz and P. Rogaway, "UMAC: Fast and secure message authentication," Springer, 1999, pp. 79-79.
-
(1999)
UMAC: Fast and Secure Message Authentication
, pp. 79-79
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
20
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography, "Information Theory, IEEE Transactions on, vol. 22, no. 6, 1976, pp. 644-654.
-
(1976)
Information Theory, IEEE Transactions on
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
23
-
-
49649117422
-
New routing algorithms in trustworthy Internet
-
X. Wang, L. Guo, T. Yang, W. Ji, Y. Li, X. Liu, et al., "New routing algorithms in trustworthy Internet," Computer Communications, vol. 31, no. 14, 2008, pp. 3533-3536.
-
(2008)
Computer Communications
, vol.31
, Issue.14
, pp. 3533-3536
-
-
Wang, X.1
Guo, L.2
Yang, T.3
Ji, W.4
Li, Y.5
Liu, X.6
-
24
-
-
84855462493
-
-
4/29
-
"IPv4 Routed /24 AS Links Dataset," http://www.caida.org/data/ active/ipv4-routed-topology-aslinks-dataset.xml, 4/29/2011.
-
(2011)
IPv4 Routed /24 AS Links Dataset
-
-
-
26
-
-
84855428291
-
-
CNGI-CERNET2, http://www.cernet2.edu.cn/index-en.htm.
-
-
-
|