-
1
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
In Proceedings of ACM Mobicom. New York: ACM Press
-
Aad, I., J. P. Hubaux, and E. Knightly. 2004. Denial of service resilience in ad hoc networks. In Proceedings of ACM Mobicom. New York: ACM Press.
-
(2004)
-
-
Aad, I.1
Hubaux, J.P.2
Knightly, E.3
-
2
-
-
0037224225
-
IP traceback using header compression
-
Aljifri, H., M. Smets, and A. Pons. 2003. IP traceback using header compression. Computers & Security, 22 (2): 136-51.
-
(2003)
Computers & Security
, vol.22
, Issue.2
, pp. 136-151
-
-
Aljifri, H.1
Smets, M.2
Pons, A.3
-
3
-
-
35048820228
-
Mayday: Distributed filtering for Internet services
-
In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems. Berkeley, CA: USENIX Press
-
Andersen, D. G. 2003. Mayday: Distributed filtering for Internet services. In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems. Berkeley, CA: USENIX Press.
-
(2003)
-
-
Andersen, D.G.1
-
4
-
-
3543121457
-
Preventing Internet denial of service with capabilities
-
In Proceedings of HotNets-II. New York: ACM Press
-
Anderson, T., T. Roscoe, and D. Wetherall. 2003. Preventing Internet denial of service with capabilities. In Proceedings of HotNets-II. New York: ACM Press.
-
(2003)
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
5
-
-
85050149881
-
Active Internet traffic filtering: Real-time response to denial-of-service attacks
-
In Proceedings of the USENIX Annual Technical Conference. Berkeley, CA: USENIX Press
-
Argyraki, K., and D. R. Cheriton. 2005. Active Internet traffic filtering: Real-time response to denial-of-service attacks. In Proceedings of the USENIX Annual Technical Conference. Berkeley, CA: USENIX Press.
-
(2005)
-
-
Argyraki, K.1
Cheriton, D.R.2
-
6
-
-
84949938425
-
DoS-resistant authentication with client puzzles
-
Aura, T., P. Nikander, and J. Leiwo. 2000. DoS-resistant authentication with client puzzles. Proceedings of Security Protocols Workshop, Lecture Notes in Computer Science, 213 (33): 170-81.
-
(2000)
Proceedings of Security Protocols Workshop, Lecture Notes in Computer Science
, vol.213
, Issue.33
, pp. 170-181
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
7
-
-
84925368904
-
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
-
In Proceedings of USENIX Security Symposium, 15-28. Berkeley, CA: USENIX Press
-
Bellardo, J., and S. Savage. 2003. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of USENIX Security Symposium, 15-28. Berkeley, CA: USENIX Press.
-
(2003)
-
-
Bellardo, J.1
Savage, S.2
-
8
-
-
14944374775
-
SYN cookies
-
accessed October 31, 2006
-
Bernstein, D. J. 1996. SYN cookies. http://cr.yp.to/syncookies.html (accessed October 31, 2006).
-
(1996)
-
-
Bernstein, D.J.1
-
9
-
-
30344478446
-
Bro Intrusion Detection System
-
Bro, accessed October 31, 2006
-
Bro. 2006. Bro Intrusion Detection System. http://bro-ids.org/(accessed October 31, 2006).
-
(2006)
-
-
-
10
-
-
84886181976
-
-
CERT, CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks, accessed January 2, 2006
-
CERT. 1996. CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. www.cert.org/advisories/CA-1996-21.html (accessed January 2, 2006).
-
(1996)
-
-
-
11
-
-
14844283358
-
CERT Advisory CA-1997-28 IP Denial-of-Service Attacks
-
CERT, accessed August 20, 2006
-
CERT. 1997. CERT Advisory CA-1997-28 IP Denial-of-Service Attacks. www.cert.org/advisories/CA-1997-28.html (accessed August 20, 2006).
-
(1997)
-
-
-
12
-
-
0009985757
-
CERT Advisory CA-1998-01 Smurf IP denial-of-service attacks
-
CERT, accessed January 2, 2006
-
CERT. 1998. CERT Advisory CA-1998-01 Smurf IP denial-of-service attacks. www.cert.org/advisories/CA-1998-01.html (accessed January 2, 2006).
-
(1998)
-
-
-
13
-
-
84886125233
-
Technical Cyber Security Alert TA04-028A
-
CERT, W32/MyDoom.B virus, accessed January 2, 2006
-
CERT. 2004. Technical Cyber Security Alert TA04-028A, W32/MyDoom.B virus. www.us-cert.gov/cas/techalerts/TA04-028A.html (accessed January 2, 2006).
-
(2004)
-
-
-
14
-
-
24944574614
-
CERT/CC Statistics 1988-2005
-
CERT, accessed January 2, 2006
-
CERT. 2006. CERT/CC Statistics 1988-2005. www.cert.org/stats/#incidents (accessed January 2, 2006).
-
(2006)
-
-
-
15
-
-
85084160220
-
Mapping and visualizing the internet
-
In Proceedings of USENIX Annual Technical Conference. Berkeley, CA: USENIX Press
-
Cheswick, B., H. Burch, and S. Branigan. 2000. Mapping and visualizing the internet. In Proceedings of USENIX Annual Technical Conference. Berkeley, CA: USENIX Press.
-
(2000)
-
-
Cheswick, B.1
Burch, H.2
Branigan, S.3
-
16
-
-
0011309001
-
Dealing with malloc fail and high CPU utilization resulting from the code red worm
-
CISCO, accessed April 15, 2006
-
CISCO. 2001. Dealing with malloc fail and high CPU utilization resulting from the code red worm. www.cisco. com/warp/public/63/ts_codred_worm.shtml (accessed April 15, 2006).
-
(2001)
-
-
-
17
-
-
56449096542
-
CISCO IOS NetFlow
-
CISCO, accessed August 20, 2006
-
CISCO. (2006). CISCO IOS NetFlow. www.cisco.com/en/US/products/ps6601/products_ios_protocol_group_ home.html (accessed August 20, 2006).
-
(2006)
-
-
-
18
-
-
84886121860
-
CISCO PIX 500 Series Security Appliances
-
CISCO, accessed August 20, 2006
-
CISCO. (2006). CISCO PIX 500 Series Security Appliances . www.cisco.com/en/US/products/hw/vpndevc/ps2030/index.html (accessed August 20, 2006)
-
(2006)
-
-
-
19
-
-
84886184314
-
Cisco Guard DDoS Mitigation Appliances
-
CISCO, accessed August 20, 2006
-
CISCO. (2006). Cisco Guard DDoS Mitigation Appliances . www.cisco.com/en/US/products/ps5888/index. html (accessed August 20, 2006).
-
(2006)
-
-
-
20
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
In Proceedings of the 12th USENIX Security Symposium. Berkeley, CA: USENIX Press
-
Cowan, C., S. Beattie, J. Johansen, and P. Wagle. 2003. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium. Berkeley, CA: USENIX Press
-
(2003)
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
21
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
In Proceedings of the 12th USENIX Security Symposium, 29-44. Berkeley, CA: USENIX Press
-
Crosby, S. A., and D. S. Wallach. 2003. Denial of service via algorithmic complexity attacks. In Proceedings of the 12th USENIX Security Symposium, 29-44. Berkeley, CA: USENIX Press.
-
(2003)
-
-
Crosby, S.A.1
Wallach, D.S.2
-
22
-
-
85084162892
-
Using client puzzles to protect TLS
-
In Proceedings of the 10th Annual USENIX Security Symposium. Berkeley, CA: USENIX Press
-
Dean, D., and A. Stubblefield. 2001. Using client puzzles to protect TLS. In Proceedings of the 10th Annual USENIX Security Symposium. Berkeley, CA: USENIX Press.
-
(2001)
-
-
Dean, D.1
Stubblefield, A.2
-
23
-
-
85025403958
-
An algebraic approach to IP traceback
-
Dean, D., M. Franklin, and A. Stubblefield. 2002. An algebraic approach to IP traceback. ACM Transactions on Information and System Security, 5 (2): 119-37.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
24
-
-
84886199715
-
Cyber Defense Technology Experimental Research
-
DETER, accessed January 2, 2006
-
DETER 2005. Cyber Defense Technology Experimental Research. www.isi.edu/deter (accessed January 2, 2006).
-
(2005)
-
-
-
25
-
-
1242350165
-
The DoS Project's "trinoo" distributed denial of service attack tool
-
accessed January 2, 2006
-
Dittrich, D. 1999. The DoS Project's "trinoo" distributed denial of service attack tool. http://staff.washington. edu/dittrich/misc/trinoo.analysis (accessed January 2, 2006).
-
(1999)
-
-
Dittrich, D.1
-
26
-
-
84886129142
-
Evaluation methods for Internet security technology
-
EMIST, accessed January 2, 2006
-
EMIST. 2005. Evaluation methods for Internet security technology. www.isi.edu/deter/emist.temp.html (accessed January 2, 2006).
-
(2005)
-
-
-
27
-
-
0003553457
-
RFC 2267-Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
accessed January 2, 2006
-
Ferguson, P., and D. Senie. 1998. RFC 2267-Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. www.faqs. org/rfcs/rfc2267.html (accessed January 2, 2006)
-
(1998)
-
-
Ferguson, P.1
Senie, D.2
-
28
-
-
85084163167
-
Multops: A data-structure for bandwidth attack detection
-
In Proceedings of USENIX Security Symposium. Berkeley, CA: USENIX Press
-
Gil, T. M., and M. Poletter. 2001. Multops: A data-structure for bandwidth attack detection. In Proceedings of USENIX Security Symposium. Berkeley, CA: USENIX Press.
-
(2001)
-
-
Gil, T.M.1
Poletter, M.2
-
29
-
-
15944408818
-
Tactical bandwidth exhaustion in ad hoc networks
-
In Proceedings of the 5th Annual IEEE Information Assurance Workshop, 257-64. New York: IEEE Press
-
Gu, Q., P. Liu, and C. Chu. 2004. Tactical bandwidth exhaustion in ad hoc networks. In Proceedings of the 5th Annual IEEE Information Assurance Workshop, 257-64. New York: IEEE Press.
-
(2004)
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
-
30
-
-
33846606856
-
Defending against packet injection attacks in unreliable ad hoc networks
-
Proceedings of IEEE Globecom. New York: IEEE Press
-
Gu, Q., P. Liu, S. Zhu, and C. H. Chu. 2005. Defending against packet injection attacks in unreliable ad hoc networks. Proceedings of IEEE Globecom. New York: IEEE Press.
-
(2005)
-
-
Gu, Q.1
Liu, P.2
Zhu, S.3
Chu, C.H.4
-
31
-
-
25844458510
-
Reduction of quality (RoQ) attacks on Internet end systems
-
Proceedings of INFOCOM. New York: IEEE Press
-
Guirguis, M., A. Bestavros I. Matta and Y. Zhang. 2005. Reduction of quality (RoQ) attacks on Internet end systems. Proceedings of INFOCOM. New York: IEEE Press.
-
(2005)
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
32
-
-
26844502466
-
A preliminary simulation of the effect of scanning worm activity on multicast
-
In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Society
-
Hamadeh, I., J. Hart, G. Kesidis, and V. Pothamsetty. 2005. A preliminary simulation of the effect of scanning worm activity on multicast. In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Society.
-
(2005)
-
-
Hamadeh, I.1
Hart, J.2
Kesidis, G.3
Pothamsetty, V.4
-
33
-
-
55149094672
-
Internet denial of service considerations
-
accessed October 31, 2006
-
Handley, M. and E. Rescorla. 2006. Internet denial of service considerations. http://tools.ietf.org/html/draftiab-dos-05 (accessed October 31, 2006).
-
(2006)
-
-
Handley, M.1
Rescorla, E.2
-
34
-
-
26844548971
-
Know your enemy: Tracking botnets
-
Honeynet, accessed January 2, 2006
-
Honeynet 2005. Know your enemy: Tracking botnets. www.honeynet.org/papers/bots/(accessed January 2, 2006).
-
(2005)
-
-
-
35
-
-
0003976889
-
Trends in denial of service attack technology
-
accessed January 2, 2006
-
Houle, K. J., and G. M. Weaver. 2001. Trends in denial of service attack technology. www.cert.org/archive/pdf/DoS_trends.pdf (accessed January 2, 2006).
-
(2001)
-
-
Houle, K.J.1
Weaver, G.M.2
-
36
-
-
0004118152
-
Ariadne: a secure on-demand routing protocol for ad hoc networks
-
In Proceedings of ACM Mobicom, 12-23. New York: ACM Press
-
Hu, Y. C., A Perrig, and D. B. Johnson. 2002. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM Mobicom, 12-23. New York: ACM Press.
-
(2002)
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
37
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu, Y. C., A Perrig, and D. B. Johnson. 2003. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1 (1): 175-92.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
38
-
-
1842569653
-
Implementing pushback: Router-based defense against DDoS attacks
-
In Proceedings of NDSS. Reston, VA: The Internet Society. Jian, W. 2000. A possible LAST_ACK DoS attack and fix, accessed October 31, 2006
-
Ioannidis, J., S. M. Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of NDSS. Reston, VA: The Internet Society. Jian, W. 2000. A possible LAST_ACK DoS attack and fix. www.ussg.iu.edu/hypermail/linux/kernel/0004.1/0105. html (accessed October 31, 2006).
-
(2002)
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
39
-
-
17644411571
-
Hop-count filtering: an effective defense against spoofed DDoS traffic
-
In Proceedings of ACM CCS, 30-41. New York: ACM Press
-
Jin, C., H. Wang, and K. G. Shin. (2003). Hop-count filtering: an effective defense against spoofed DDoS traffic. In Proceedings of ACM CCS, 30-41. New York: ACM Press.
-
(2003)
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
40
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks (DSR)
-
accessed May 23, 2007
-
Johnson, D. B., D. A. Maltz, and Y-C. Hu. 2002. The dynamic source routing protocol for mobile ad hoc networks (DSR). www3.ietf.org/proceedings/04mar/ID/draft-ietf-manet-dsr-09.txt (accessed May 23, 2007).
-
(2002)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
41
-
-
0002459783
-
Client puzzle: A cryptographic defense against connection depletion attacks
-
In Proceedings of NDSS, 151-65. Reston, VA: The Internet Society
-
Juels, A., and J. Brainard. 1999. Client puzzle: A cryptographic defense against connection depletion attacks. In Proceedings of NDSS, 151-65. Reston, VA: The Internet Society.
-
(1999)
-
-
Juels, A.1
Brainard, J.2
-
42
-
-
84924375780
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation . Berkeley, CA: USENIX Press
-
Kandula S., D. Katabi, M. Jacob, and A. Berger. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation . Berkeley, CA: USENIX Press.
-
(2005)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
43
-
-
0742269306
-
SOS: An architecture for mitigating DDoS attacks
-
Keromytis, A. D., V. Misra, and D. Rubenstein. 2004. SOS: An architecture for mitigating DDoS attacks. IEEE Journal on Selected Areas of Communications, 33 (3): 413-26.
-
(2004)
IEEE Journal on Selected Areas of Communications
, vol.33
, Issue.3
, pp. 413-426
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
44
-
-
1242287727
-
Low-rate TCPtargeted denial of service attacks
-
Proceedings of ACM SIGCOMM, 75-86. New York: ACM Press
-
Kuzmanovic, A., and E. W. Knightly. 2003. Low-rate TCPtargeted denial of service attacks. Proceedings of ACM SIGCOMM, 75-86. New York: ACM Press.
-
(2003)
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
45
-
-
0036349004
-
Save: Source address validity enforcement protocol
-
Li, J., J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. 2002. Save: Source address validity enforcement protocol . Proceedings of IEEE Infocom 3: 1557-66.
-
(2002)
Proceedings of IEEE Infocom
, vol.3
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
46
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan, R., S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. 2002. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communications Review 32 (3): 62-73.
-
(2002)
ACM SIGCOMM Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
47
-
-
84886108301
-
MAZU Enforcer
-
MAZU, accessed January 2, 2006
-
MAZU. 2006. MAZU Enforcer. www.mazunetworks.com/products/mazu-enforcer.php. (accessed January 2, 2006).
-
(2006)
-
-
-
49
-
-
3543115759
-
Alliance formation for DDoS defense
-
In Proceedings of the New Security Paradigms Workshop in ACM SIGSAC. New York: ACM Press
-
Mirkovic, J., M. Robinson, P. Reiher, and G. Kuenning. 2003. Alliance formation for DDoS defense. In Proceedings of the New Security Paradigms Workshop in ACM SIGSAC. New York: ACM Press.
-
(2003)
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
Kuenning, G.4
-
50
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Mirkovic, J., and P. Reiher, 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34 (2): 39-53.
-
(2004)
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
51
-
-
29244475815
-
Internet denial of service: Attack and defense mechanisms
-
Upper Saddle River, NJ: Prentice Hall
-
Mirkovic, J., S. Dietrich, D. Dittrich, and P. Reiher. 2005. Internet denial of service: Attack and defense mechanisms . Upper Saddle River, NJ: Prentice Hall.
-
(2005)
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
52
-
-
37349105907
-
Extortion via DDoS on the rise
-
accessed October 31, 2006
-
Pappalardo, D., and E. Messmer. 2005. Extortion via DDoS on the rise. www.techworld.com/security/features/index.cfm?featureid1452 (accessed October 31, 2006).
-
(2005)
-
-
Pappalardo, D.1
Messmer, E.2
-
53
-
-
0001083965
-
On the effectiveness of routebased packet filtering for distributed DoS attack prevention in power-law Internets
-
In Proceedings of ACM SI. New York: ACM Press
-
Park, K., and H. Lee. 2001. On the effectiveness of routebased packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of ACM SI. New York: ACM Press.
-
(2001)
-
-
Park, K.1
Lee, H.2
-
54
-
-
0031247411
-
End-to-end routing behavior on the Internet
-
Paxson, V. 1997. End-to-end routing behavior on the Internet . IEEE/ACM Transactions on Networking, 5 (5).
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.5
-
-
Paxson, V.1
-
55
-
-
0003843664
-
Ad hoc on-demand distance vector (AODV) routing
-
accessed May 23, 2007
-
Perkins, C.E., E.M. Belding-Royer, and S. R. Das. 2002. Ad hoc on-demand distance vector (AODV) routing. http://tools.ietf.org/html/draft-ietf-manet-aodv-11 (accessed May 23, 2007).
-
(2002)
-
-
Perkins, C.E.1
Belding-royer, E.M.2
Das, S.R.3
-
56
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Perrig, A., R. Canetti, D. Tygar, and D. Song. 2002. The TESLA broadcast authentication protocol. Cryptobytes , 5 (2): 2-13.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
57
-
-
0033650584
-
Practical network support for IP traceback
-
In Proceedings of ACM SIGCOMM, 295-306. New York: ACM Press
-
Savage, S., D. Wetherall, A. Karlin, and T. Anderson. 2000. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM, 295-306. New York: ACM Press.
-
(2000)
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
58
-
-
0036947484
-
Beyond folklore: Observations on fragmented traffic
-
Shannon, C., D. Moore, and K. C. Claffy, 2002. Beyond folklore: Observations on fragmented traffic. IEEE/ACM Transactions on Networking, 10 (6): 709-20.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.6
, pp. 709-720
-
-
Shannon, C.1
Moore, D.2
Claffy, K.C.3
-
59
-
-
33646920013
-
Hash-based IP traceback
-
In Proceedings of ACM SIGCOMM . New York: ACM Press
-
Snoeren, A. C., C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. 2001. Hash-based IP traceback. In Proceedings of ACM SIGCOMM . New York: ACM Press.
-
(2001)
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
60
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
In Proceedings of IEEE INFOCOM. New York: IEEE Press
-
Song, D., and A. Perrig. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM. New York: IEEE Press.
-
(2001)
-
-
Song, D.1
Perrig, A.2
-
61
-
-
85084162258
-
How to own the internet in your spare time
-
In Proceedings of the 11th USENIX Security Symposium, 207-13. Berkeley, CA: USENIX Press
-
Staniford, S., V. Paxson, and N. Weaver. 2002. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, 207-13. Berkeley, CA: USENIX Press.
-
(2002)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
62
-
-
34250620174
-
Net-Bouncer: Client-legitimacy-based high-performance DDoS filtering
-
In Proceedings of DARPA Information Survivability Conference and Exposition
-
Thomas, R., B. Mark, T. Johnson, and J. Croall. 2003. Net-Bouncer: Client-legitimacy-based high-performance DDoS filtering. In Proceedings of DARPA Information Survivability Conference and Exposition, 1 :14.
-
(2003)
, vol.1
, pp. 14
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
64
-
-
0036343692
-
Detecting SYN flooding attacks
-
In Proceedings of IEEE Infocom. New York: IEEE Press
-
Wang, H., D. Zhang, and K. G. Shin. 2002. Detecting SYN flooding attacks. In Proceedings of IEEE Infocom. New York: IEEE Press.
-
(2002)
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
65
-
-
14844334596
-
Mitigating bandwidthexhaustion attacks using congestion puzzles
-
In Proceedings of ACM CCS, New York: ACM Press
-
Wang, X., and M. K. Reiter. 2004. Mitigating bandwidthexhaustion attacks using congestion puzzles. In Proceedings of ACM CCS, 257-67. New York: ACM Press.
-
(2004)
, pp. 257-267
-
-
Wang, X.1
Reiter, M.K.2
-
66
-
-
77958453829
-
Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs
-
accessed January 2, 2006
-
Wullems, C., K. Tham, J. Smith, and M. Looi. 2004. Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs. www.isi.qut. edu.au/research/publications/technical/wlan.php (accessed January 2, 2006).
-
(2004)
-
-
Wullems, C.1
Tham, K.2
Smith, J.3
Looi, M.4
-
67
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
In Proceeding of ACM Mobihoc, New York: ACM Press
-
Xu, W., W. Trappe, Y. Zhang, and T. Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceeding of ACM Mobihoc, 46-57. New York: ACM Press.
-
(2005)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
68
-
-
0037810705
-
Pi: A path identification mechanism to defend against DoS attacks
-
In Proceedings of IEEE Symposium on Security and Privacy . New York IEEE Press
-
Yaar, A., A. Perrig, and D. Song. 2003. Pi: A path identification mechanism to defend against DoS attacks. In Proceedings of IEEE Symposium on Security and Privacy . New York IEEE Press.
-
(2003)
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
69
-
-
3543097593
-
SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
-
In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press
-
Yaar, A., A. Perrig, and D. Song. 2004. SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press.
-
(2004)
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
70
-
-
25844461391
-
FIT: Fast internet traceback
-
In Proceedings of IEEE Infocom. New York: IEEE Press
-
Yaar, A., Perrig, A., and Song, D. 2005. FIT: Fast internet traceback. In Proceedings of IEEE Infocom. New York: IEEE Press.
-
(2005)
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
71
-
-
33749866400
-
A DoSlimiting network architecture
-
In Proceedings of ACM SIGCOMM. New York: ACM Press
-
Yang, X., D. Wetherall, and T. Anderson. 2005. A DoSlimiting network architecture. In Proceedings of ACM SIGCOMM. New York: ACM Press.
-
(2005)
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
72
-
-
3543100577
-
Statistical enroute detection and filtering of injected false data in sensor networks
-
In Proceedings of IEEE INFOCOM. New York: IEEE Press
-
Ye, F., H. Luo, S. Lu, and L. Zhang. 2004. Statistical enroute detection and filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM. New York: IEEE Press.
-
(2004)
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
73
-
-
15744365243
-
Improvements on the WTLS protocol to avoid denial of service attacks
-
Zhang, R., and K. Chen. 2005. Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security, 24 (1): 76-82.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 76-82
-
-
Zhang, R.1
Chen, K.2
-
74
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press
-
Zhu, S., S. Setia, S. Jajodia, and P. Ning. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press.
-
(2004)
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|