-
2
-
-
21844439800
-
-
InternetNews.com, October
-
R. Naraine, "Massive DDoS attack hit DNS root servers," InternetNews.com, October 2002, http://www.esecurityplanet.com/trends/article. php/1486981/Massive-DDoS-Attack-Hit-DNS-Root-Servers.htm.
-
(2002)
Massive DDoS Attack Hit DNS Root Servers
-
-
Naraine, R.1
-
3
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
4
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems,"ACM Computing Surveys (CSUR), vol. 39, no. 1, 2007.
-
(2007)
ACM Computing Surveys (CSUR)
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
5
-
-
77950819080
-
RAD: Reflector attack defense using message authentication codes
-
E. Kline, M. Beaumont-Gay, J. Mirkovic, and P. Reiher, "RAD: Reflector attack defense using message authentication codes," in Proceedings of Annual Computer Security Applications Conference (ASAC), 2009, pp. 269-278.
-
Proceedings of Annual Computer Security Applications Conference (ASAC), 2009
, pp. 269-278
-
-
Kline, E.1
Beaumont-Gay, M.2
Mirkovic, J.3
Reiher, P.4
-
6
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
May
-
P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing,"RFC 2827, May 2000.
-
(2000)
RFC
, vol.2827
-
-
Ferguson, P.1
Senie, D.2
-
7
-
-
79961236654
-
The spoofer project: Inferring the extent of source address filtering on the internet
-
R. Beverly and S. Bauer, "The spoofer project: Inferring the extent of source address filtering on the internet," in Proceedings of USENIX SRUTI, 2005, pp. 53-59.
-
Proceedings of USENIX SRUTI, 2005
, pp. 53-59
-
-
Beverly, R.1
Bauer, S.2
-
8
-
-
33746205206
-
A Border Gateway Protocol 4 (BGP-4)
-
January
-
Y. Rekhter, T. Li, and S. Hares, "A Border Gateway Protocol 4 (BGP-4)," RFC 4271, January 2006.
-
(2006)
RFC
, vol.4271
-
-
Rekhter, Y.1
Li, T.2
Hares, S.3
-
10
-
-
33845209699
-
Towards a global IP anycast service
-
August
-
H. Ballani and P. Francis, "Towards a global IP anycast service,"in Proceedings of SIGCOMM, vol. 35, no. 4, August 2005, pp. 301-312.
-
(2005)
Proceedings of SIGCOMM
, vol.35
, Issue.4
, pp. 301-312
-
-
Ballani, H.1
Francis, P.2
-
11
-
-
0003252383
-
Generic Routing Encapsulation (GRE)
-
March
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina, "Generic Routing Encapsulation (GRE)," RFC 2784, March 2000.
-
(2000)
RFC
, vol.2784
-
-
Farinacci, D.1
Li, T.2
Hanks, S.3
Meyer, D.4
Traina, P.5
-
13
-
-
0003314621
-
Internet Protocol
-
September
-
J. Postel, "Internet Protocol," RFC 791, September 1981.
-
(1981)
RFC
, vol.791
-
-
Postel, J.1
-
18
-
-
84855432102
-
-
"Akamai," http://www.akamai.com.
-
Akamai
-
-
-
19
-
-
0034776786
-
On the effectiveness of route-based filtering for distributed DoS attack prevention in power-law Internets
-
K. Park and H. Lee, "On the effectiveness of route-based filtering for distributed DoS attack prevention in power-law Internets," in Proceedings of SIGCOMM, vol. 31, no. 4, 2001, pp. 15-26.
-
(2001)
Proceedings of SIGCOMM
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
20
-
-
39049160574
-
Constructing inter-domain packet filters to control IP spoofing based on BGP updates
-
Z. Duan, X. Yuan, and J. Chandrashekar, "Constructing inter-domain packet filters to control IP spoofing based on BGP updates," in Proceedings of INFOCOM, 2006.
-
Proceedings of INFOCOM, 2006
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
21
-
-
33750308365
-
A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. Anderson, "A DoS-limiting network architecture," in Proceedings of SIGCOMM, 2005, pp. 241-252.
-
Proceedings of SIGCOMM, 2005
, pp. 241-252
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
22
-
-
33749831619
-
StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense
-
DOI 10.1109/JSAC.2006.877138, 1705617
-
A. Perrig, D. Song, and A. Yaar, "StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense,"IEEE Journal on Selected Areas in Communications, vol. 24, no. 10, pp. 1853-1863, October 2006. (Pubitemid 44559599)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1853-1863
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
23
-
-
65249149520
-
To filter or to authorize: Networklayer DoS defense against multimillion-node botnets
-
X. Liu, X. Yang, and Y. Lu, "To filter or to authorize: Networklayer DoS defense against multimillion-node botnets," in Proceedings of SIGCOMM, 2008, pp. 195-206.
-
Proceedings of SIGCOMM, 2008
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
24
-
-
84904888755
-
Attacking DDoS at the source
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proceedings of ICNP, 2002, pp. 312-321.
-
Proceedings of ICNP, 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
25
-
-
17644427757
-
Alliance formation for DDoS defense
-
J. Mirkovic, M. Robinson, and P. Reiher, "Alliance formation for DDoS defense," in Proceedings of NSPW, 2003, pp. 11-18.
-
Proceedings of NSPW, 2003
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
26
-
-
33744945767
-
SOS: Secure overlay services
-
A. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure overlay services," in Proceedings of SIGCOMM, 2002, pp. 61-72.
-
Proceedings of SIGCOMM, 2002
, pp. 61-72
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
|