-
1
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet Background Radiation. IMC04, pp. 27-40, 2004
-
(2004)
IMC04
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
2
-
-
78650939601
-
Internet background radiation revisited
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston. Internet Background Radiation Revisited. IMC10, pp. 62-74, 2010
-
(2010)
IMC10
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
3
-
-
82955161573
-
Analysis of country-wide internet outages caused by Censorship
-
A. Dainotti, C. Squarcella, E. Aben, K. Claffy, and M. Chiesa. Analysis of Country-wide Internet outages Caused by Censorship. IMC11, pp. 1-18, 2011
-
(2011)
IMC11
, pp. 1-18
-
-
Dainotti, A.1
Squarcella, C.2
Aben, E.3
Claffy, K.4
Chiesa, M.5
-
5
-
-
85084161486
-
Inferring internet denial-of-service activity
-
D. Moore, G. Voelker and S. Savage. Inferring Internet Denial-of-Service Activity. USENIX Security, pages 12, 2001
-
(2001)
USENIX Security
, pp. 12
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
6
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM Comp. Comm. Rev., 34(2):39-54, 2004
-
(2004)
ACMComp. Comm. Rev
, vol.34
, Issue.2
, pp. 39-54
-
-
Mirkovic, J.1
Reiher, P.2
-
8
-
-
35048867316
-
On the design and use of internet sinks for network abuse monitoring
-
V. Yegneswaran, P. Barford, and D. Plonka. On the Design and Use of Internet Sinks for Network Abuse Monitoring. RAID04, pp. 146-165, 2004
-
(2004)
RAID04
, pp. 146-165
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
9
-
-
85081770459
-
The internet motion sensor-A distributed blackhole monitoring system
-
E. Cooke, M. Bailey, D. Watson, F. Jahanian, and J. Nazario. The Internet Motion Sensor-A Distributed Blackhole Monitoring System. NDSS05, pp. 167-179, 2005
-
(2005)
NDSS05
, pp. 167-179
-
-
Cooke, E.1
Bailey, M.2
Watson, D.3
Jahanian, F.4
Nazario, J.5
-
10
-
-
84870898677
-
Classifying internet one-way traffic
-
E. Glatz, X. Dimitropoulos. Classifying Internet one-way traffic. IMC12, pp. 37-50, 2012
-
(2012)
IMC12
, pp. 37-50
-
-
Glatz, E.1
Dimitropoulos, X.2
-
12
-
-
84908617098
-
-
The Protocols. Addison-Wesley Longman Publishing Co., Inc
-
Kevin R. Fall, W. Richard Stevens. TCP/IP Illustrated (Volume 1): The Protocols. Addison-Wesley Longman Publishing Co., Inc., 2011
-
(2011)
Richard Stevens TCP/IP Illustrated
, vol.1
-
-
Kevin, R.1
Fall, W.2
-
14
-
-
84908624449
-
Protect yourself from the conficker computer worm
-
Apr
-
Protect yourself from the Conficker computer worm. Microsoft Report, Apr. 2009. http://blogs.msdn.com/b/mthree/archive/2009/03/31/conficker-033109.aspx
-
(2009)
Microsoft Report
-
-
-
15
-
-
84885208106
-
-
The Rose Attack Explained. http://www.digital.net/-gandalf/Rose Frag Attack Explained.htm
-
The Rose Attack Explained
-
-
-
16
-
-
84859057202
-
One-way traffic monitoring with iatmon
-
N. Brownlee. One-way Traffic Monitoring with Iatmon. PAM12, pp. 179-188, 2012
-
(2012)
PAM12
, pp. 179-188
-
-
Brownlee, N.1
-
17
-
-
80054118821
-
A network activity classification schema and its application to scan detection
-
J. Treurniet. A Network Activity Classification Schema and Its Application to Scan Detection. IEEE/ACM Transactions on Networking, 19(5):1396-1404, 2011
-
(2011)
J. Treurniet IEEE/ ACM Transactions on Networking
, vol.19
, Issue.5
, pp. 1396-1404
-
-
-
18
-
-
84908624448
-
-
The iatmon tool. http://www.caida.org/tools/measurement/iatmon/.
-
The Iatmon Tool
-
-
|