-
1
-
-
84867663164
-
Flooding Based DDoS Attacks and Their Influence onWeb Services
-
Kumar, S., Singh, M., Sachdeva, M., Kumar, K.: Flooding Based DDoS Attacks and Their Influence onWeb Services. (IJCSIT) International Journal of Computer Science and Information Technologies 2(3), 1131-1136 (2011)
-
(2011)
(IJCSIT) International Journal of Computer Science and Information Technologies
, vol.2
, Issue.3
, pp. 1131-1136
-
-
Kumar, S.1
Singh, M.2
Sachdeva, M.3
Kumar, K.4
-
2
-
-
79953329200
-
DDoS Incidents and their Impact: A Review
-
Sachdeva, M., Singh, G., Kumar, K., Singh, K.: DDoS Incidents and their Impact: A Review. International Arab Journal of Information Technology 7(1), 14-20 (2010)
-
(2010)
International Arab Journal of Information Technology
, vol.7
, Issue.1
, pp. 14-20
-
-
Sachdeva, M.1
Singh, G.2
Kumar, K.3
Singh, K.4
-
3
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), 38-47 (2001)
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
4
-
-
0742269306
-
SOS: An architecture for mitigating DDoS attacks
-
Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas in Communications 22(1), 176-188 (2004)
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 176-188
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
6
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: 1997 IEEE Symposium on Security and Privacy - Proceedings, pp. 208-223 (1997)
-
(1997)
1997 IEEE Symposium on Security and Privacy - Proceedings
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
7
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44(5), 643-666 (2004)
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
8
-
-
77956877779
-
Defense techniques for low-rate DoS attacks against application servers
-
Macia-Fernandez, G., Rodriguez-Gomez, R.A., Diaz-Verdejo, J.E.: Defense techniques for low-rate DoS attacks against application servers. Computer Networks 54(15), 2711-2727 (2010)
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2711-2727
-
-
Macia-Fernandez, G.1
Rodriguez-Gomez, R.A.2
Diaz-Verdejo, J.E.3
-
9
-
-
33845714972
-
Evaluation of a low-rate DoS attack against iterative servers
-
Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against iterative servers. Computer Networks 51(4), 1013-1030 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.4
, pp. 1013-1030
-
-
Macia-Fernandez, G.1
Diaz-Verdejo, J.E.2
Garcia-Teodoro, P.3
-
10
-
-
55649105431
-
Evaluation of a low-rate DoS attack against application servers
-
Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a low-rate DoS attack against application servers. Computers & Security 27(7-8), 335-354 (2008)
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 335-354
-
-
Macia-Fernandez, G.1
Diaz-Verdejo, J.E.2
Garcia-Teodoro, P.3
-
11
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE-ACM Transactions on Networking 14(4), 683-696 (2006)
-
(2006)
IEEE-ACM Transactions on Networking
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
12
-
-
47949098054
-
A collaborative defense mechanism against SYN flooding attacks in IP networks
-
Safa, H., Chouman, M., Artail, H., Karam, M.: A collaborative defense mechanism against SYN flooding attacks in IP networks. Journal of Network and Computer Applications 31(4), 509-534 (2008)
-
(2008)
Journal of Network and Computer Applications
, vol.31
, Issue.4
, pp. 509-534
-
-
Safa, H.1
Chouman, M.2
Artail, H.3
Karam, M.4
-
13
-
-
1242287724
-
A framework for classifying denial of service attacks
-
Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. Computer Communication Review 33(4), 99-110 (2003)
-
(2003)
Computer Communication Review
, vol.33
, Issue.4
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
14
-
-
10644248262
-
Characterization of defense mechanisms against distributed denial of service attacks
-
Chen, L.C., Longstaff, T.A., Carley, K.M.: Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23(8), 665-678 (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 665-678
-
-
Chen, L.C.1
Longstaff, T.A.2
Carley, K.M.3
-
15
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS Defense mechanisms
-
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS Defense mechanisms. Computer Communication Review 34(2), 39-53 (2004)
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
16
-
-
33749377422
-
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
-
Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. Springer, Heidelberg
-
Tariq, U., Hong, M.-P., Lhee, K.-S.: A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. In: Li, X., Zaïane, O.R., Li, Z. (eds.) ADMA 2006. LNCS (LNAI), vol. 4093, pp. 1025-1036. Springer, Heidelberg (2006)
-
(2006)
LNCS (LNAI)
, vol.4093
, pp. 1025-1036
-
-
Tariq, U.1
Hong, M.-P.2
Lhee, K.-S.3
-
17
-
-
17744369470
-
Exploiting the transients of adaptation for RoQ attacks on Internet resources
-
Guirguis, M., Bestavros, A., Matta, I.: Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: 12th IEEE International Conference on Network Protocols - Proceedings, pp. 184-195 (2004)
-
(2004)
12th IEEE International Conference on Network Protocols - Proceedings
, pp. 184-195
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
18
-
-
25844458510
-
Reduction of Quality (RoQ) attacks on Internet end-systems
-
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of Quality (RoQ) attacks on Internet end-systems. In: Proceedings of the IEEE Infocom 2005: The Conference on Computer Communications, vol. 1-4, pp. 1362-1372 (2005)
-
(2005)
Proceedings of the IEEE Infocom 2005: The Conference on Computer Communications
, vol.1-4
, pp. 1362-1372
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.T.4
-
19
-
-
34548297939
-
Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
-
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs. In: Infocom 2007, vol. 1-5, pp. 857-865 (2007)
-
(2007)
Infocom 2007
, vol.1-5
, pp. 857-865
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.T.4
-
20
-
-
33846425791
-
Adversarial exploits of end-systems adaptation dynamics
-
Guirguis, M., Bestavros, A., Matta, I., Zhang, Y.T.: Adversarial exploits of end-systems adaptation dynamics. Journal of Parallel and Distributed Computing 67(3), 318-335 (2007)
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, Issue.3
, pp. 318-335
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.T.4
-
21
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Siris, V.A., Papagalou, F.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 29(9), 1433-1442 (2006)
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
24
-
-
0030193563
-
IPv6: The new Internet protocol
-
Stallings, W.: IPv6: The new Internet protocol. IEEE Communications Magazine 34(7), 96-108 (1996)
-
(1996)
IEEE Communications Magazine
, vol.34
, Issue.7
, pp. 96-108
-
-
Stallings, W.1
-
25
-
-
69749128415
-
LoRDAS: A Low-Rate DoS Attack against Application Servers
-
Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. Springer, Heidelberg
-
Maciá-Fernández, G., Díaz-Verdejo, J.E., García-Teodoro, P., de Toro-Negro, F.: LoRDAS: A Low-Rate DoS Attack against Application Servers. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 197-209. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5141
, pp. 197-209
-
-
Maciá-Fernández, G.1
Díaz-Verdejo, J.E.2
García-Teodoro, P.3
De Toro-Negro, F.4
|