-
1
-
-
84885599595
-
-
Arbor networks 2012
-
Arbor networks. worldwide infraestructure security report. vol. 4., < http://www.arbornetworks.com/en/research.html >; 2012.
-
Worldwide Infraestructure Security Report
, vol.4
-
-
-
2
-
-
84885620562
-
-
[Dns-operations] lots of queries for txt records?
-
[Dns-operations] lots of queries for txt records?. < https://lists.dns-oarc.net/pipermail/dns-operations/2009-April/003779.html >; 2012.
-
(2012)
-
-
-
4
-
-
84885653098
-
-
Slowloris http dos. < http://ha.ckers.org/slowloris/ >; 2012.
-
(2012)
Slowloris Http Dos
-
-
-
5
-
-
84885593344
-
-
Mitigating slowloris. < http://www.cert.org/blogs/certcc/2009/07/ slowloris-vs-your-webserver.html >; 2012.
-
(2012)
Mitigating Slowloris
-
-
-
8
-
-
84885606766
-
-
Media temple network unavailability. < http://status.mediatemple.net/ weblog/category/system-incidents/1319-mt-media-temple-network-unavailability/ >; 2010.
-
(2010)
Media Temple Network Unavailability
-
-
-
12
-
-
84885617255
-
-
2012
-
Operation payback. < http://en.wikipedia.org/wiki/Operation-Payback >; 2012.
-
Operation Payback
-
-
-
13
-
-
84885652917
-
-
Low orbit ion cannon. < http://sourceforge.net/projects/loic/ >; 2012.
-
(2012)
Low Orbit Ion Cannon
-
-
-
14
-
-
84885598935
-
-
Siege. < http://www.joedog.org/index/siege-home >; 2012.
-
(2012)
Siege
-
-
-
15
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage Inferring internet denial-of-service activity ACM Trans Comput Sys 24 2 2006 115 139
-
(2006)
ACM Trans Comput Sys
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
16
-
-
62749197655
-
A multi-layered approach to botnet detection
-
H.R. Arabnia, S. Aissi, CSREA Press
-
R.F. Erbacher, A. Cutler, P. Banerjee, and J. Marshall A multi-layered approach to botnet detection H.R. Arabnia, S. Aissi, Security and Management 2008 CSREA Press 301 308
-
(2008)
Security and Management
, pp. 301-308
-
-
Erbacher, R.F.1
Cutler, A.2
Banerjee, P.3
Marshall, J.4
-
17
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
Y. Chen, K. Hwang, and W.-S. Ku Collaborative detection of ddos attacks over multiple network domains IEEE Trans Parallel Distrib Sys 18 12 2007 1649 1662
-
(2007)
IEEE Trans Parallel Distrib Sys
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
18
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions SIGCOMM Comput Commun Rev 35 4 2005 217 228
-
(2005)
SIGCOMM Comput Commun Rev
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
19
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
K. Hwang, M. Cai, Y. Chen, and M. Qin Hybrid intrusion detection with weighted signature generation over anomalous internet episodes IEEE Trans Dependable Secur Comput 4 1 2007 41 55
-
(2007)
IEEE Trans Dependable Secur Comput
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
20
-
-
65249149520
-
To filter or to authorize: Network-layer dos defense against multimillion-node botnets
-
ACM New York, NY, USA
-
X. Liu, X. Yang, and Y. Lu To filter or to authorize: network-layer dos defense against multimillion-node botnets SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 Conference on Data communication 2008 ACM New York, NY, USA 195 206
-
(2008)
SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication
, pp. 195-206
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
21
-
-
37849002360
-
Towards user-centric metrics for denial-of-service measurement
-
ACM New York, NY, USA
-
J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, and R. Thomas Towards user-centric metrics for denial-of-service measurement ExpCS '07: Proceedings of the 2007 workshop on Experimental computer science 2007 ACM New York, NY, USA 8
-
(2007)
ExpCS '07: Proceedings of the 2007 Workshop on Experimental Computer Science
, pp. 8
-
-
Mirkovic, J.1
Hussain, A.2
Wilson, B.3
Fahmy, S.4
Reiher, P.5
Thomas, R.6
-
23
-
-
38549145516
-
Machine learning for automatic defence against distributed denial of service attacks
-
Seufert S, O'Brien D. Machine learning for automatic defence against distributed denial of service attacks. In: ICC, IEEE; 2007. p. 1217-22.
-
(2007)
ICC, IEEE
, pp. 1217-1222
-
-
Seufert, S.1
O'Brien, D.2
-
24
-
-
70350422660
-
Chaos theory based detection against network mimicking ddos attacks
-
A. Chonka, J. Singh, and W. Zhou Chaos theory based detection against network mimicking ddos attacks Comm Lett 13 9 2009 717 719
-
(2009)
Comm Lett
, vol.13
, Issue.9
, pp. 717-719
-
-
Chonka, A.1
Singh, J.2
Zhou, W.3
-
25
-
-
17444397467
-
Ddos attack detection and wavelets
-
L. Li, and G. Lee Ddos attack detection and wavelets Telecommun Sys 28 3-4 2005 435 451
-
(2005)
Telecommun Sys
, vol.28
, Issue.34
, pp. 435-451
-
-
Li, L.1
Lee, G.2
-
27
-
-
47249136154
-
Engaging edge networks in preventing and mitigating undesirable network traffic
-
IEEE Computer Society Washington, DC, USA
-
L. Wang, Q. Wu, and D.D. Luong Engaging edge networks in preventing and mitigating undesirable network traffic NPSEC '07: Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols 2007 IEEE Computer Society Washington, DC, USA 1 6
-
(2007)
NPSEC '07: Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
, pp. 1-6
-
-
Wang, L.1
Wu, Q.2
Luong, D.D.3
-
29
-
-
27544465087
-
Detecting incoming and outgoing ddos attacks at the edge using a single set of network characteristics
-
IEEE Computer Society Washington, DC, USA
-
C. Siaterlis, and V. Maglaris Detecting incoming and outgoing ddos attacks at the edge using a single set of network characteristics Proceedings of the 10th IEEE Symposium on Computers and Communications 2005 IEEE Computer Society Washington, DC, USA 469 475
-
(2005)
Proceedings of the 10th IEEE Symposium on Computers and Communications
, pp. 469-475
-
-
Siaterlis, C.1
Maglaris, V.2
-
30
-
-
77950336949
-
Follow the (slash) dot: Effects of feedback on new members in an online community
-
M. Pendergast, K. Schmidt, G. Mark, M. Ackerman, ACM
-
C. Lampe, and E. Johnston Follow the (slash) dot: effects of feedback on new members in an online community M. Pendergast, K. Schmidt, G. Mark, M. Ackerman, GROUP 2005 ACM 11 20
-
(2005)
GROUP
, pp. 11-20
-
-
Lampe, C.1
Johnston, E.2
-
31
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Y. Xie, and S.-Z. Yu Monitoring the application-layer ddos attacks for popular websites IEEE/ACM Trans Netw 17 1 2009 15 25
-
(2009)
IEEE/ACM Trans Netw
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
32
-
-
67249100781
-
An automatic scheme to categorize user sessions in modern http traffic
-
Lin X, Quan L, Wu H. An automatic scheme to categorize user sessions in modern http traffic. In: GLOBECOM, IEEE; 2008. p. 1485-90.
-
(2008)
GLOBECOM, IEEE
, pp. 1485-1490
-
-
Lin, X.1
Quan, L.2
Wu, H.3
-
33
-
-
36849045127
-
Workload characterization of uncacheable http content
-
Munich, LNCS 3140. Springer [Caching over the Entire User-to-Data Path, 2003]
-
Zhu Z, Mao Y, Shi W. Workload characterization of uncacheable http content. In: Proceedings of International Conference on Web Engineering, Munich, LNCS 3140. Springer; 2004. p. 391-39 [Caching over the Entire User-to-Data Path, 2003].
-
(2004)
Proceedings of International Conference on Web Engineering
, pp. 391-439
-
-
Zhu, Z.1
Mao, Y.2
Shi, W.3
-
35
-
-
66749157109
-
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
-
X. Luo, E.W.W. Chan, and R.K.C. Chang Detecting pulsing denial-of-service attacks with nondeterministic attack intervals EURASIP J Adv Signal Process 2009 2009 8:1 8:13
-
(2009)
EURASIP J Adv Signal Process
, vol.2009
, pp. 81-813
-
-
Luo, X.1
Chan, E.W.W.2
Chang, R.K.C.3
|