-
4
-
-
84896884316
-
-
Sep. 1 [Online]
-
(2013, Sep. 1). Spoofer Project [Online]. Available: http://spoofer. cmand.org/index.php
-
(2013)
Spoofer Project
-
-
-
5
-
-
84877726988
-
Understanding the efficacy of deployed internet source address validation filtering
-
R. Beverly, A. Berger, Y. Hyun, and K. Claffy, "Understanding the efficacy of deployed internet source address validation filtering, " in Proc. IMC, 2009, pp. 356-369.
-
(2009)
Proc. IMC
, pp. 356-369
-
-
Beverly, R.1
Berger, A.2
Hyun, Y.3
Claffy, K.4
-
6
-
-
84896900231
-
-
Jan (Re: Isprime DOS in Progress)
-
F. Bulk. (2009, Jan.). Are We Really This Helpless? (Re: Isprime DOS in Progress) http://mailman.nanog.org/pipermail/nanog/2009-January/006996.html
-
(2009)
Are We Really This Helpless?
-
-
Bulk, F.1
-
7
-
-
84896882447
-
-
Burlington, MA, USA: Arbor Networks
-
R. Dobbins and C. Morales, Worldwide Infrastructure Security Report, vol. 6. Burlington, MA, USA: Arbor Networks, 2010.
-
(2010)
Worldwide Infrastructure Security Report
, vol.6
-
-
Dobbins, R.1
Morales, C.2
-
9
-
-
84055179063
-
A deployable approach for inter-As anti-spoofing
-
Oct.
-
B. Liu, J. Bi, and Y. Zhu, "A deployable approach for inter-As anti-spoofing, " in Proc. 19th IEEE ICNP, Oct. 2011, pp. 19-24.
-
(2011)
Proc. 19th IEEE ICNP
, pp. 19-24
-
-
Liu, B.1
Bi, J.2
Zhu, Y.3
-
10
-
-
54749133714
-
-
Jun [Online]
-
J. Wu, J. Bi, X. Li, G. Ren, K. Xu, and M. I. Williams. (2008, Jun.). A Source Address Validation Architecture (Sava) Testbed and Deployment Experience [Online]. Available: http://tools.ietf.org/html/rfc5210
-
(2008)
A Source Address Validation Architecture (Sava) Testbed and Deployment Experience
-
-
Wu, J.1
Bi, J.2
Li, X.3
Ren, G.4
Xu, K.5
Williams, M.I.6
-
11
-
-
78751666107
-
Comparative evaluation of spoofing defenses
-
Mar./Apr.
-
J. Mirkovic and E. Kissel, "Comparative evaluation of spoofing defenses, " IEEE Trans. Depend. Secure Comput., vol. 8, no. 2, pp. 218-232, Mar./Apr. 2011.
-
(2011)
IEEE Trans. Depend. Secure Comput.
, vol.8
, Issue.2
, pp. 218-232
-
-
Mirkovic, J.1
Kissel, E.2
-
12
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
-
DOI 10.1145/964723.383061
-
K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, " in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun., Oct. 2001, pp. 15-26. (Pubitemid 32981951)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
13
-
-
25844486083
-
Spoofing prevention method
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
A. Bremler-Barr and H. Levy, "Spoofing prevention method, " in Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc., vol. 1. Mar. 2005, pp. 536-547. (Pubitemid 41390849)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.1
, pp. 536-547
-
-
Bremler-Barr, A.1
Levy, H.2
-
14
-
-
39049160574
-
Constructing inter-domain packet filters to control IP spoofing based on BGP updates
-
Z. Duan, X. Yuan, and J. Chandrashekar, "Constructing inter-domain packet filters to control IP spoofing based on BGP updates, " in Proc. INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. INFOCOM
, pp. 1-12
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
15
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, "SAVE: Source address validity enforcement protocol, " in Proc. INFOCOM, 2002, pp. 1557-1566.
-
(2002)
Proc. INFOCOM
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
16
-
-
33749831619
-
StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense
-
DOI 10.1109/JSAC.2006.877138, 1705617
-
A. Yaar, A. Perrig, and D. Song, "StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense, " IEEE J. Sel. Areas Commun., vol. 24, no. 10, pp. 1853-1863, Oct. 2006. (Pubitemid 44559599)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1853-1863
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
17
-
-
85083279650
-
Passport: Secure and adoptable source authentication
-
X. Liu, A. Li, X. Yang, and D. Wetherall, "Passport: Secure and adoptable source authentication, " in Proc. 5th USENIX Symp. NSDI, 2008, pp. 365-378.
-
(2008)
Proc. 5th USENIX Symp. NSDI
, pp. 365-378
-
-
Liu, X.1
Li, A.2
Yang, X.3
Wetherall, D.4
-
18
-
-
84896831789
-
-
Aug. 30 [Online]
-
(2013, Aug. 30). RIPE IP Anti-Spoofing Task Force [Online]. Available: http://www.ripe.net/ripe/groups/tf/anti-spoofing
-
(2013)
RIPE IP Anti-Spoofing Task Force
-
-
-
19
-
-
84896886180
-
-
[Online]
-
(2012). BCP38 Deployment[Online].Available:http://mailman.nanog.org/ pipermail/nanog/2012-March/047093.html
-
(2012)
BCP38 Deployment
-
-
-
20
-
-
84896886180
-
-
[Online]
-
(2012). BCP38 Deployment [Online]. Available: http://mailman.nanog. org/pipermail/nanog/2012-March/047087.html
-
(2012)
BCP38 Deployment
-
-
-
22
-
-
84894530492
-
FaaS: Filtering IP spoofing traffic as a service
-
Oct.
-
B. Liu, J. Bi, and X. Yang, "FaaS: Filtering IP spoofing traffic as a service, " ACM SIGCOMM Comput. Commun. Rev., vol. 42, no. 4, pp. 113-114, Oct. 2012.
-
(2012)
ACM SIGCOMM Comput. Commun. Rev.
, vol.42
, Issue.4
, pp. 113-114
-
-
Liu, B.1
Bi, J.2
Yang, X.3
-
24
-
-
84896815253
-
-
Dec. 1
-
(2013, Dec. 1). Number Resources [Online]. Available: http://www.iana.org/numbers
-
(2013)
Number Resources [Online]
-
-
-
25
-
-
1842432047
-
An analysis of update ordering in distributed replication systems
-
W. Zhou, L. Wang, and W. Jia, "An analysis of update ordering in distributed replication systems, " Future Generat. Comput. Syst., vol. 20, no. 4, pp. 565-590, 2004.
-
(2004)
Future Generat. Comput. Syst.
, vol.20
, Issue.4
, pp. 565-590
-
-
Zhou, W.1
Wang, L.2
Jia, W.3
-
26
-
-
0023833640
-
Timestamps in message-passing systems that preserve the partial ordering
-
C. J. Fidge, "Timestamps in message-passing systems that preserve the partial ordering, " in Proc. 11th Austral. Comput. Sci. Conf., vol. 10. 1988, no. 1, pp. 56-66.
-
(1988)
Proc. 11th Austral. Comput. Sci. Conf.
, vol.10
, Issue.1
, pp. 56-66
-
-
Fidge, C.J.1
-
27
-
-
85008006673
-
Adaptive task checkpointing and replication: Toward efficient fault-tolerant grids
-
Feb.
-
M. Chtepen, F. H. Claeys, B. Dhoedt, F. De Turck, P. Demeester, and P. A. Vanrolleghem, "Adaptive task checkpointing and replication: Toward efficient fault-tolerant grids, " IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 2, pp. 180-190, Feb. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.2
, pp. 180-190
-
-
Chtepen, M.1
Claeys, F.H.2
Dhoedt, B.3
De Turck, F.4
Demeester, P.5
Vanrolleghem, P.A.6
-
28
-
-
84896875682
-
-
Dec. 1 [Online]
-
(2013, Dec. 1). Configuring IP Access Lists [Online]. Available: http://www.cisco.com/en/US/products/sw/secursw/ps1018/products-tech- note09186a00800a5b9a.shtml
-
(2013)
Configuring IP Access Lists
-
-
-
29
-
-
84859991654
-
Optimal source-based filtering of malicious traffic
-
Apr.
-
F. Soldo, K. Argyraki, and A. Markopoulou, "Optimal source-based filtering of malicious traffic, " IEEE/ACM Trans. Netw., vol. 20, no. 2, pp. 381-395, Apr. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.2
, pp. 381-395
-
-
Soldo, F.1
Argyraki, K.2
Markopoulou, A.3
-
30
-
-
84896813314
-
-
Oct. 11 [Online]
-
(2012, Oct. 11). Routeviews Prefix to AS Mappings [Online]. Available: http://data.caida.org/datasets/routing/routeviews-prefix2as/
-
(2012)
Routeviews Prefix to AS Mappings
-
-
-
31
-
-
84896844857
-
-
Oct. 11 [Online]
-
(2012, Oct. 11). Internet Topology Collection [Online]. Available: http://irl.cs.ucla.edu/topology
-
(2012)
Internet Topology Collection
-
-
-
32
-
-
84896865537
-
-
Oct. 12 [Online]
-
B. Quoitin. (2012, Oct. 12). C-BGP [Online]. Available: http://c-bgp.sourceforge.net
-
(2012)
C-BGP
-
-
Quoitin, B.1
-
33
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity, " ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
34
-
-
77957595181
-
-
Dec. 4 [Online]
-
(2013, Dec. 4). Cidr Report [Online]. Available: http://www.cidr-report. org/as2.0/
-
(2013)
Cidr Report
-
-
|