-
1
-
-
2442567993
-
Mayday: Distributed Filtering for Internet Services
-
D. Andersen. Mayday: Distributed Filtering for Internet Services. In USENIX USITS, 2003.
-
(2003)
USENIX USITS
-
-
Andersen, D.1
-
2
-
-
70349723394
-
Accountable Internet Protocol (AIP)
-
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet Protocol (AIP). In ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
5
-
-
69249233518
-
Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks
-
K. Argyraki and D. R. Cheriton. Scalable Network-layer Defense Against Internet Bandwidth-Flooding Attacks. ACM/IEEE ToN, 17(4), 2009.
-
(2009)
ACM/IEEE ToN
, vol.17
, Issue.4
-
-
Argyraki, K.1
Cheriton, D.R.2
-
6
-
-
84891624492
-
Off by default!
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. Off by default! In ACM Hotnets-IV, 2005.
-
(2005)
ACM Hotnets-IV
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
8
-
-
74549143893
-
Policing Congestion Response in an Internetwork using Re-feedback
-
B. Briscoe, A. Jacquet, C. D. Cairano-Gilfedder, A. Salvatori, A. Soppera, and M. Koyabe. Policing Congestion Response in an Internetwork using Re-feedback. In ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Briscoe, B.1
Jacquet, A.2
Cairano-Gilfedder, C.D.3
Salvatori, A.4
Soppera, A.5
Koyabe, M.6
-
10
-
-
34250640971
-
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks
-
M. Casado, P. Cao, A. Akella, and N. Provos. Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. In IWQoS, 2006.
-
(2006)
IWQoS
-
-
Casado, M.1
Cao, P.2
Akella, A.3
Provos, N.4
-
11
-
-
0024681411
-
Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks
-
D.-M. Chiu and R. Jain. Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks. Comput. Netw. ISDN Syst., 17(1), 1989.
-
(1989)
Comput. Netw. ISDN Syst.
, vol.17
, Issue.1
-
-
Chiu, D.-M.1
Jain, R.2
-
12
-
-
78149344126
-
-
CSS Routing and Bridging Configuration Guide. http://www.cisco.com/en/US/ docs/app-ntwk-services/data-center-app-services/css11500series/v7.30/ configuration/routing/guide/IP.html, 2010.
-
(2010)
CSS Routing and Bridging Configuration Guide
-
-
-
13
-
-
78149352479
-
-
Technical Report UCAM-CL-TR-703, University of Cambridge, Computer Laboratory
-
J. Crowcroft, T. Deegan, C. Kreibich, R. Mortier, and N. Weaver. Lazy Susan: Dumb Waiting as Proof of Work. Technical Report UCAM-CL-TR-703, University of Cambridge, Computer Laboratory, 2007.
-
(2007)
Lazy Susan: Dumb Waiting As Proof of Work
-
-
Crowcroft, J.1
Deegan, T.2
Kreibich, C.3
Mortier, R.4
Weaver, N.5
-
14
-
-
84874728299
-
-
Deterlab. http://www.deterlab.net/, 2010.
-
(2010)
-
-
-
16
-
-
17744362134
-
Robust Congestion Signaling
-
D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson. Robust Congestion Signaling. In In IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Ely, D.1
Spring, N.2
Wetherall, D.3
Savage, S.4
Anderson, T.5
-
18
-
-
0027647490
-
Random Early Detection Gateways for Congestion Avoidance
-
S. Floyd and V. Jacobson. Random Early Detection Gateways for Congestion Avoidance. IEEE/ACM ToN, 1(4), 1993.
-
(1993)
IEEE/ACM ToN
, vol.1
, Issue.4
-
-
Floyd, S.1
Jacobson, V.2
-
19
-
-
33750298863
-
Designing Extensible IP Router Software
-
M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing Extensible IP Router Software. In USENIX/ACM NSDI, 2005.
-
(2005)
USENIX/ACM NSDI
-
-
Handley, M.1
Kohler, E.2
Ghosh, A.3
Hodson, O.4
Radoslavov, P.5
-
20
-
-
78149331565
-
-
Helion Technology. AES Cores. http://www.heliontech.com/aes.htm, 2010.
-
(2010)
AES Cores
-
-
-
21
-
-
78149311356
-
-
Intel AES Instructions Set. http://software.intel.com/en-us/articles/ intel-advanced-encryption-standard-aesinstructions-set/, 2010.
-
(2010)
Intel AES Instructions Set
-
-
-
24
-
-
0040291388
-
The Click Modular Router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM TOCS, 18(3), 2000.
-
(2000)
ACM TOCS
, vol.18
, Issue.3
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
25
-
-
84874744472
-
Using Packet Symmetry to Curtail Malicious Traffic
-
C. Kreibich, A. Warfield, J. Crowcroft, S. Hand, and I. Pratt. Using Packet Symmetry to Curtail Malicious Traffic. In ACM Hotnets-IV, 2005.
-
(2005)
ACM Hotnets-IV
-
-
Kreibich, C.1
Warfield, A.2
Crowcroft, J.3
Hand, S.4
Pratt, I.5
-
27
-
-
66249102841
-
To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets
-
X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
29
-
-
33846670896
-
Realistic Internet Traffic Simulation through Mixture Modeling and a Case Study
-
S. Luo and G. A. Marin. Realistic Internet Traffic Simulation through Mixture Modeling and A Case Study. In Winter Simulation Conference, 2005.
-
Winter Simulation Conference, 2005
-
-
Luo, S.1
Marin, G.A.2
-
30
-
-
4544272175
-
Controlling High Bandwidth Aggregates in the Network
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM CCR, 32(3), 2002.
-
(2002)
ACM SIGCOMM CCR
, vol.32
, Issue.3
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
31
-
-
17744383634
-
Controlling High-Bandwidth Flows at the Congested Router
-
R. Mahajan, S. Floyd, and D. Wetherall. Controlling High-Bandwidth Flows at the Congested Router. In IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Mahajan, R.1
Floyd, S.2
Wetherall, D.3
-
32
-
-
69249123696
-
dFence: Transparent Network-based Denial of Service Mitigation
-
A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang. dFence: Transparent Network-based Denial of Service Mitigation. In USENIX/ACM NSDI, 2007.
-
(2007)
USENIX/ACM NSDI
-
-
Mahimkar, A.1
Dange, J.2
Shmatikov, V.3
Vin, H.4
Zhang, Y.5
-
34
-
-
0031175629
-
The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm
-
M. Mathis, J. Semke, J. Mahdavi, and T. Ott. The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm. ACM SIGCOMM CCR, 27(3), 1997.
-
(1997)
ACM SIGCOMM CCR
, vol.27
, Issue.3
-
-
Mathis, M.1
Semke, J.2
Mahdavi, J.3
Ott, T.4
-
35
-
-
36949036429
-
Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. In ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
38
-
-
65249174985
-
-
Technical Report CMU-CS-06-114, Carnegie Mellon University
-
E. Shi, I. Stoica, D. Andersen, and A. Perrig. OverDoSe: A Generic DDoS Protection Service Using an Overlay Network. Technical Report CMU-CS-06-114, Carnegie Mellon University, 2006.
-
(2006)
OverDoSe: A Generic DDoS Protection Service Using An Overlay Network
-
-
Shi, E.1
Stoica, I.2
Andersen, D.3
Perrig, A.4
-
39
-
-
85013295511
-
Efficient Fair Queueing Using Deficit Round Robin
-
M. Shreedhar and G. Varghese. Efficient Fair Queueing Using Deficit Round Robin. In ACM SIGCOMM, 1995.
-
(1995)
ACM SIGCOMM
-
-
Shreedhar, M.1
Varghese, G.2
-
40
-
-
33745781163
-
Countering DoS Attacks with Stateless Multipath Overlays
-
A. Stavrou and A. Keromytis. Countering DoS Attacks with Stateless Multipath Overlays. In ACM SIGCOMM CCS, 2005.
-
(2005)
ACM SIGCOMM CCS
-
-
Stavrou, A.1
Keromytis, A.2
-
41
-
-
0037295811
-
Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks
-
I. Stoica, S. Shenker, and H. Zhang. Core-Stateless Fair Queueing: a Scalable Architecture to Approximate Fair Bandwidth Allocations in High-Speed Networks. IEEE/ACM ToN, 2003.
-
(2003)
IEEE/ACM ToN
-
-
Stoica, I.1
Shenker, S.2
Zhang, H.3
-
42
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
R. Stone. CenterTrack: An IP Overlay Network for Tracking DoS Floods. In USENIX Security Symposium, 2000.
-
USENIX Security Symposium, 2000
-
-
Stone, R.1
-
43
-
-
78149288572
-
-
DDoS Mitigation to the Rescue. https://www.arbornetworks.com/dmdocuments/ DDoS%20Mitigation%20to%20the%20Rescue.pdf, 2010.
-
(2010)
DDoS Mitigation to the Rescue
-
-
-
44
-
-
0022796415
-
New Directions in Communications (Or Which Way to the Information Age?)
-
J. S. Turner. New Directions in Communications (Or Which Way to the Information Age?). IEEE Communications Magazine, 1986.
-
(1986)
IEEE Communications Magazine
-
-
Turner, J.S.1
-
45
-
-
47749130236
-
DDoS Defense by Offense
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS Defense by Offense. In ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
46
-
-
57949088008
-
One More Bit is Enough
-
Y. Xia, L. Subramanian, I. Stoica, and S. Kalyanaraman. One More Bit is Enough. IEEE/ACM ToN, 16(6), 2008.
-
(2008)
IEEE/ACM ToN
, vol.16
, Issue.6
-
-
Xia, Y.1
Subramanian, L.2
Stoica, I.3
Kalyanaraman, S.4
|