-
2
-
-
33746660645
-
Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets
-
DOI 10.1007/11767480-9, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Athanasopoulos, E., Anagnostakis, K., Markatos, E.: Misusing Unstructured P2P systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 130-145. Springer, Heidelberg (2006) (Pubitemid 44152814)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989
, pp. 130-145
-
-
Athanasopoulos, E.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
4
-
-
77953066525
-
Choosing reputable servents in a p2p network
-
Cornelli, F., Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: Proceedings of WWW 2002 (2002)
-
(2002)
Proceedings of WWW 2002
-
-
Cornelli, F.1
Damiani, E.2
Vimercati, S.3
Paraboschi, S.4
Samarati, P.5
-
6
-
-
51349125816
-
Live baiting for service-level DoS attackers
-
Khattab, S., Gobriel, S., Melhem, R., Mossäe, D.: Live Baiting for Service-level DoS Attackers. In: Proceedings of INFOCOM 2008 (2008)
-
(2008)
Proceedings of INFOCOM 2008
-
-
Khattab, S.1
Gobriel, S.2
Melhem, R.3
Mossäe, D.4
-
7
-
-
25844492549
-
On the effectiveness of DDoS attacks on statistical filtering
-
Li, Q., Chang, E., Chan, M.: On the Effectiveness of DDoS Attacks on Statistical Filtering. In: Proceedings of INFOCOM 2005 (2005)
-
(2005)
Proceedings of INFOCOM 2005
-
-
Li, Q.1
Chang, E.2
Chan, M.3
-
9
-
-
78049513091
-
Analysis of a general probabilistic packet marking model for IP traceback
-
Lu, L., Chan, M., Chang, E.: Analysis of a General Probabilistic Packet Marking Model for IP traceback. In: Proceedings of ASIACCS 2008 (2008)
-
(2008)
Proceedings of ASIACCS 2008
-
-
Lu, L.1
Chan, M.2
Chang, E.3
-
10
-
-
29244475815
-
-
Prentice Hall PTR, Englewood Cliffs
-
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, Englewood Cliffs (2004)
-
(2004)
Internet Denial of Service: Attack and Defense Mechanisms
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
12
-
-
18744376590
-
Using graphical turing tests to counter automated DDoS attacks against web servers
-
Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using graphical turing tests to counter automated DDoS attacks against web servers. In: Proceedings of ACM CCS 2003 (2003)
-
(2003)
Proceedings of ACM CCS 2003
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
14
-
-
77954321139
-
Fine-grained capabilities for flooding DDoS defense using client reputations
-
Natu, M., Mirkovic, J.: Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations. In: Proceedings of LSAD 2007 (2007)
-
(2007)
Proceedings of LSAD 2007
-
-
Natu, M.1
Mirkovic, J.2
-
15
-
-
33845591142
-
DDoS-resilient scheduling to counter application layer attacks under imperfect detection
-
Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E.: DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection. In: Proceedings of INFOCOM 2006 (2006)
-
(2006)
Proceedings of INFOCOM 2006
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
16
-
-
33646831908
-
TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks. In: Proceedings of WWW 2005 (2005)
-
(2005)
Proceedings of WWW 2005
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
17
-
-
47249148481
-
Mitigating application-level denial of service attacks on web servers: A client-transparent approach
-
Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Transactions on the Web (2008)
-
(2008)
ACM Transactions on the Web
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
21
-
-
47749130236
-
DDoS defense by offense
-
Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS Defense by Offense. In: Proceedings of SIGCOMM 2006 (2006)
-
(2006)
Proceedings of SIGCOMM 2006
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
22
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Xie, Y., Yu, S.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Transactions on Networking (2009)
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
23
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Xie, Y., Yu, S.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (2009)
-
(2009)
IEEE/ACM Transactions on Networking
-
-
Xie, Y.1
Yu, S.2
-
24
-
-
47149094655
-
A detection and offense mechanism to defend against application layer DDoS attacks
-
Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
-
(2007)
Proceedings of ICNS 2007
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
|