-
1
-
-
67649889403
-
Flexible deterministic packet marking: An ip traceback system to find the real source of attacks
-
Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An ip traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
2
-
-
0033650584
-
Practical network support for ip traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. E. Anderson, "Practical network support for ip traceback," in SIGCOMM, 2000, pp. 295-306.
-
(2000)
SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.E.4
-
3
-
-
40749152296
-
Probabilistic packet marking for large-scale ip traceback
-
M. T. Goodrich, "Probabilistic packet marking for large-scale ip traceback," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 15-24, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.1
, pp. 15-24
-
-
Goodrich, M.T.1
-
4
-
-
0038059205
-
Ip traceback with deterministic packet marking
-
A. Belenky and N. Ansari, "Ip traceback with deterministic packet marking," IEEE Communications Letters, vol. 7, no. 4, pp. 162-164, 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
5
-
-
34247634501
-
On deterministic packet marking
-
-, "On deterministic packet marking," Computer Networks, vol. 51, no. 10, pp. 2677-2700, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.10
, pp. 2677-2700
-
-
Belenky, A.1
Ansari, N.2
-
6
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
-
(2007)
SEC
, pp. 229-240
-
-
Thing, V.L.L.1
Sloman, M.2
Dulay, N.3
-
7
-
-
84861634583
-
Can we beat legitimate cyber behavior mimicking attacks from botnets?
-
S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets" in Proceedings of the INFOCOM, 2012.
-
(2012)
Proceedings of the INFOCOM
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
-
8
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, "Discriminating ddos attacks from flash crowds using flow correlation coefficient," IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 6, pp. 794-805, 2012.
-
(2012)
IEEE Transactions on Parallel Distributed Systems
, vol.23
, Issue.6
, pp. 794-805
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
9
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in HotBots'07: Proceedings of the FIRST conference on Hot Topics in Understanding Botnets, 2007.
-
(2007)
HotBots'07: Proceedings of the FIRST Conference on Hot Topics in Understanding Botnets
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
10
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," ACM Transactions on Computer Systems, vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
11
-
-
33644906610
-
Deterministic packet marking based on redundant decomposition for ip traceback
-
G. Jin and J. Yang, "Deterministic packet marking based on redundant decomposition for ip traceback," IEEE Communications Letters, vol. 10, no. 3, pp. 204-206, 2006.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.3
, pp. 204-206
-
-
Jin, G.1
Yang, J.2
-
12
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
13
-
-
69749100394
-
An information-theoretic view of network-aware malware attacks
-
Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530-541, 2009.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 530-541
-
-
Chen, Z.1
Ji, C.2
-
14
-
-
0035823152
-
Zipf distribution of U. S. Firm sizes
-
R. L. Axtell, "Zipf distribution of u. s. firm sizes," Science, vol. 293, 2001.
-
(2001)
Science
, vol.293
-
-
Axtell, R.L.1
-
15
-
-
79960601554
-
A brief history of generative models for power law and lognornal distributions
-
M. Mitzenmacher, "A brief history of generative models for power law and lognornal distributions," Internet Mathematics, vol. 1, 2004.
-
(2004)
Internet Mathematics
, vol.1
-
-
Mitzenmacher, M.1
|