-
1
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
April
-
J. Mirkovic, P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Commun. Rev., vol. 34, no. 2, April 2004, pp. 39-53
-
(2004)
ACM SIGCOMM Computer Commun. Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
2
-
-
79551523280
-
-
IEEE Trans. Parallel and Distributed Systems Mar
-
S. Yu et al., "Traceback of DDoS Attacks Using Entroy Variations," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 3, Mar. 2011, pp. 412-25.
-
(2011)
Traceback of ddos attacks using entroy variations
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
-
3
-
-
84890517059
-
IP flow-based technology
-
"IP Flow-Based Technology," ArborNetworks, http://www. arbornetworks.com, 2010.
-
(2010)
ArborNetworks
-
-
-
4
-
-
84886875487
-
Locator/ID Separation Protocol (LISP)
-
Jan
-
D. Farinacci et al., "Locator/ID Separation Protocol (LISP)," IETF RFC 6830, Jan. 2013.
-
(2013)
IETF RFC
, vol.6830
-
-
Farinacci, D.1
-
5
-
-
79952040446
-
Decoupling the design of identifierto-locator mapping services from identifiers
-
Mar
-
H. Luo, H. Zhang, and M. Zukerman, "Decoupling the Design of Identifierto-Locator Mapping Services from Identifiers," Computer Networks (Elsevier), vol. 55, no. 4, Mar. 2011, pp. 959-74.
-
(2011)
Computer Networks Elsevier
, vol.55
, Issue.4
, pp. 959-974
-
-
Luo, H.1
Zhang, H.2
Zukerman, M.3
-
6
-
-
84890448056
-
-
Trend Micro 2011 Threat Predictions: Mobile Devices and Diversity of Operating Systems Will Expand Cybercriminal Reach
-
Trend Micro 2011 Threat Predictions: Mobile Devices and Diversity of Operating Systems Will Expand Cybercriminal Reach, http://trendmicro.mediaroom. com/index.php?s=43&news-item=851&type =archived&year=2010.
-
-
-
-
7
-
-
84890481860
-
Identifier/locator separation: A worm detection and prevention perspective
-
Conf. Advanced Intelligence and Awareness Internet, Oct Shenzhen, China.
-
K. Wang, H. Luo, and Y. Qin, "Identifier/Locator Separation: A Worm Detection and Prevention Perspective," Proc. 2011 Int'l. Conf. Advanced Intelligence and Awareness Internet, Oct. 2011, Shenzhen, China.
-
(2011)
Proc. 2011 Int'l
-
-
Wang, K.1
Luo, H.2
Qin, Y.3
-
9
-
-
84890538909
-
-
Nonparametric Methods in Change-Point Problems Kluwer Academic
-
B. E. Brodsky and B. S. Darkhovsky, Nonparametric Methods in Change-Point Problems, Kluwer Academic, 1993.
-
(1993)
Darkhovsky
-
-
Brodsky, B.E.1
Darkhovsky, S.B.2
-
10
-
-
33745205813
-
-
ACM Trans. Computer Systems May
-
D. Moore et al., "Inferring Internet Denial-of-Service Activity," ACM Trans. Computer Systems, vol. 24, no. 2, May 2006, pp. 115-39.
-
(2006)
Inferring internet denial-of-service activity
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
-
11
-
-
84890535025
-
-
Cisco Locator/ID Separation Protocol Security
-
]. Cisco Locator/ID Separation Protocol Security, http://www.cisco.com/ en/US/prod/collateral/iosswrel/ps6537/ps6554 /ps6599/ps10800/at-a-glance-c45- 645204.pdf.
-
-
-
-
12
-
-
84890489594
-
Defending against distributed denial of service attack under tunnel based forwarding
-
Thesis, Aalto University, Aug
-
]. F. K. Ghalati, "Defending Against Distributed Denial of Service Attack Under Tunnel based Forwarding," Master Thesis, Aalto University, Aug. 2011.
-
(2011)
Master
-
-
Ghalati, F.K.1
|