-
1
-
-
84907922541
-
-
Arbor Networks
-
Arbor Networks. 2012 Infrastructure Security Report.[Online]. Available: http://tinyurl.com/ag6tht4
-
(2012)
Infrastructure Security Report
-
-
-
2
-
-
84901406051
-
-
US-CERT. DNS Amplification Attacks-Alert (TA13-088A)
-
US-CERT. DNS Amplification Attacks-Alert (TA13-088A).[Online]. Available: http://tinyurl.com/bp4xud4
-
-
-
-
6
-
-
84889029859
-
-
the 12th IEEE International Symposium on Network Computing and Applications (NCA), 2013
-
Fachkha et al., Towards a forecasting model for distributed denial of service activities, in the 12th IEEE International Symposium on Network Computing and Applications (NCA), 2013, 2013, pp. 110-117.
-
(2013)
Towards A Forecasting Model for Distributed Denial of Service Activities
, pp. 110-117
-
-
Fachkha1
-
11
-
-
77955771346
-
Dtrab:combating against attacks on encrypted protocols through traffic-feature analysis
-
Fadlullah et al., Dtrab:combating against attacks on encrypted protocols through traffic-feature analysis, IEEE/ACM Transactions on Networking (TON), vol. 18, no. 4, pp. 1234-1247, 2010.
-
(2010)
IEEE/ACM Transactions on Networking (TON)
, vol.18
, Issue.4
, pp. 1234-1247
-
-
Fadlullah1
-
12
-
-
78149346483
-
Passive ip traceback: Capturing the origin of anonymous traffic through network telescopes
-
Aug
-
Yao et al., Passive ip traceback: capturing the origin of anonymous traffic through network telescopes, SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, Aug. 2010.
-
(2010)
SIGCOMM Comput. Commun. Rev
, vol.41
, Issue.4
-
-
Yao1
-
13
-
-
77954294167
-
Study on classification and characteristics of source address spoofing attacks in the internet
-
Washington DC, USA IEEE Computer Society
-
J. Bi, P. Hu, and P. Li, Study on classification and characteristics of source address spoofing attacks in the internet, in Proceedings of the 2010 Ninth International Conference on Networks. Washington, DC, USA: IEEE Computer Society, 2010.
-
(2010)
Proceedings of the 2010 Ninth International Conference on Networks
-
-
Bi, J.1
Hu, P.2
Li, P.3
-
14
-
-
70350307600
-
High level internet scale traffic visualization using hilbert curve mapping
-
Springer
-
B. Irwin and N. Pilkington, High level internet scale traffic visualization using hilbert curve mapping, in VizSEC 2007. Springer, 2008.
-
(2007)
VizSEC
, vol.2008
-
-
Irwin, B.1
Pilkington, N.2
-
15
-
-
84901450923
-
Characterizing dark dns behavior
-
J. Oberheide, M. Karir, and Z. M. Mao, Characterizing dark dns behavior, in In Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2007.
-
(2007)
Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Oberheide, J.1
Karir, M.2
Mao, Z.M.3
-
16
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, SIGCOMM Comput. Commun. Rev., 2001.
-
(2001)
SIGCOMM Comput. Commun. Rev
-
-
Paxson, V.1
-
17
-
-
84055171428
-
Corrupted dns resolution paths: The rise of a malicious resolution authority
-
Dagon et al., Corrupted dns resolution paths: The rise of a malicious resolution authority. in NDSS, 2008.
-
(2008)
NDSS
-
-
Dagon1
-
22
-
-
14944380936
-
The top speed of flash worms
-
ser. WORM 04. New York, NY, USA: ACM
-
Staniford et al., The top speed of flash worms, in Proceedings of the 2004 ACM workshop on Rapid malcode, ser. WORM 04. New York, NY, USA: ACM, 2004, pp. 33-42.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford1
-
23
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney, Practical automated detection of stealthy portscans, Journal of Computer Security, vol. 10, no. 1, pp. 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
|