-
1
-
-
0003375670
-
An analysis of using reflectors for distributed denialof-service attacks
-
July
-
V. Paxson, An Analysis of Using Reflectors for Distributed Denialof-Service Attacks, ACM SIGCOMM, Vol. 31 Issue 3, July 2001.
-
(2001)
ACM SIGCOMM
, vol.31
, Issue.3
-
-
Paxson, V.1
-
4
-
-
84921048430
-
-
RFC 3882, July
-
W. Zhao, H. Schulzrinne, E. Guttman, C. Bisdikian, W. Jerome, Configuring BGP to Block Denial-of-Service Attacks, RFC 3882, July 2004
-
(2004)
Configuring BGP to Block Denial-of-Service Attacks
-
-
Zhao, W.1
Schulzrinne, H.2
Guttman, E.3
Bisdikian, C.4
Jerome, W.5
-
7
-
-
84897109717
-
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
April
-
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris. 2014. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62 (April 2014), 122-136
-
(2014)
Comput. Netw.
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
9
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
April
-
N. McKeown, et al., OpenFlow: enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, April 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
-
11
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
S. A. Mehdi, J. Khalid, and S. A. Khayam, Revisiting traffic anomaly detection using software defined networking. In RAID'11. 161-180, 2011
-
(2011)
RAID'11
, pp. 161-180
-
-
Mehdi, S.A.1
Khalid, J.2
Khayam, S.A.3
-
14
-
-
84255199997
-
A scalable ddos detection framework with victim pinpoint capability
-
Dec
-
H. Liu, Y. Sun, M. S. Kim, A Scalable DDoS Detection Framework with Victim Pinpoint Capability, Journal of Communications, Vol 6, No 9 (2011), 660-670, Dec 2011
-
(2011)
Journal of Communications
, vol.6
, Issue.9
, pp. 660-670
-
-
Liu, H.1
Sun, Y.2
Kim, M.S.3
-
15
-
-
0004317693
-
Quicksand: Quick summary and analysis of network data
-
Tech. Rep. 2011-43
-
A. C. Gilbert, Y. Kotidis, S. Muthukrishnan, and M. J. Strauss, "Quicksand: Quick summary and analysis of network data," DIMACS, Tech. Rep. 2011-43, 2001
-
(2001)
DIMACS
-
-
Gilbert, A.C.1
Kotidis, Y.2
Muthukrishnan, S.3
Strauss, M.J.4
-
17
-
-
33750310218
-
Using packet symmetry to curtail malicious tra-c
-
November
-
C. Kreibich, A. Warfield, J. Crowcraft, S. Hand, and I. Pratt, Using packet symmetry to curtail malicious tra-c. In Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV), November 2005
-
(2005)
Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV
-
-
Kreibich, C.1
Warfield, A.2
Crowcraft, J.3
Hand, S.4
Pratt, I.5
-
20
-
-
84921055786
-
-
Pox website, Available at http://www. noxrepo. org/pox/about-pox
-
Pox Website
-
-
-
22
-
-
84915796374
-
-
Retrieved: April
-
Vyatta Core, http://www. vyatta. org/, Retrieved: April 2014
-
(2014)
Vyatta Core
-
-
-
23
-
-
84921064981
-
-
ExaBGP, Available at https://github. com/Exa-Networks/exabgp
-
ExaBGP
-
-
-
24
-
-
84871145229
-
-
The CAIDA UCSD
-
The CAIDA UCSD "DDoS Attack 2007 Dataset", Available at http://www. caida. org/data/passive/ddos-20070804-dataset. xml
-
DDoS Attack 2007 Dataset
-
-
|