-
1
-
-
3042825073
-
IP Traceback: A New Denial-of-Service Deterrent
-
May/June
-
H. Aljifri, “IP Traceback: A New Denial-of-Service Deterrent,” IEEE Security and Privacy, May/June 2003, pp. 24-31.
-
(2003)
IEEE Security and Privacy
, pp. 24-31
-
-
Aljifri, H.1
-
4
-
-
1642535783
-
A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-sequential Change-Point Detection Methods
-
June
-
R. Blazek, et al, “A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-sequential Change-Point Detection Methods,” Proc. of IEEE Workshop on Information Assurance and Security, June 2001.
-
(2001)
Proc. of IEEE Workshop on Information Assurance and Security
-
-
Blazek, R.1
-
5
-
-
31544436627
-
Denial-of-Service Attack Detection Techniques
-
January/February
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, “Denial-of-Service Attack Detection Techniques,” IEEE Internet Computing, January/February 2006.
-
(2006)
IEEE Internet Computing
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
6
-
-
21244446746
-
Perimeter-Based Defense against High Bandwidth DDoS Attacks
-
June
-
S. Chen and Q. Song, “Perimeter-Based Defense against High Bandwidth DDoS Attacks,” IEEE Trans. on Parallel and Distributed Systems, Vol. 16, No. 6, June 2005.
-
(2005)
IEEE Trans. on Parallel and Distributed Systems
, vol.16
, Issue.6
-
-
Chen, S.1
Song, Q.2
-
11
-
-
39049161433
-
Identification of Repeated Denial of Service Attacks
-
Barcelona, Spain, April 23-29
-
A. Hussain, J. Heidemann, and C. Papadopoulos, “Identification of Repeated Denial of Service Attacks,” IEEE INFOCOM 2006, Barcelona, Spain, April 23-29, 2006.
-
(2006)
IEEE INFOCOM 2006
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
12
-
-
66249091031
-
DDoS Experiment Methodology
-
June 15-16, Arlington, VA
-
A. Hussian, S. Schwab, R. Thomas, S. Fahmy, and J. Mirkovic, “DDoS Experiment Methodology,” Proc. of 2006 DETER Community Workshop, June 15-16, 2006, Arlington, VA.
-
(2006)
Proc. of 2006 DETER Community Workshop
-
-
Hussian, A.1
Schwab, S.2
Thomas, R.3
Fahmy, S.4
Mirkovic, J.5
-
13
-
-
33847743856
-
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
-
Jan-March
-
K. Hwang, M. Cai, Y. Chen, and M. Qin, “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Trans. on Dependable and Secure Computing, Vol.4, No.1, Jan-March, 2007, pp.41-55.
-
(2007)
IEEE Trans. on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
15
-
-
8344261545
-
PacketScore: Statistics-Based Overload Control Against Distributed Denial of-Service Attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, “PacketScore: Statistics-Based Overload Control Against Distributed Denial of-Service Attacks,” Proc. INFOCOM, 2004.
-
(2004)
Proc. INFOCOM
-
-
Kim, Y.1
Lau, W. C.2
Chuah, M. C.3
Chao, H. J.4
-
17
-
-
33750074233
-
Distributed Defense Against DDOS Attacks
-
CIS Department, University of Delaware
-
J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, "Distributed Defense Against DDOS Attacks," Technical Report CIS-TR-2005-02, CIS Department, University of Delaware, 2005.
-
(2005)
Technical Report CIS-TR-2005-02
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
Oikonomou, G.4
-
18
-
-
35148816044
-
Benchmarks for DDoS Defense Evaluation
-
October
-
J. Mirkovic, E. Arikan, S. Wei, S. Fahmy, R. Thomas, and P. Reiher, “Benchmarks for DDoS Defense Evaluation,” Proc. of the Milcom 2006, October, 2006.
-
(2006)
Proc. of the Milcom 2006
-
-
Mirkovic, J.1
Arikan, E.2
Wei, S.3
Fahmy, S.4
Thomas, R.5
Reiher, P.6
-
19
-
-
84860047021
-
Cooperation in Internet Data Acquisition and Analysis
-
Cambridge, MA., Sept. 8-10, (CAIDA Project)
-
T. Monk and K. Claffy, “Cooperation in Internet Data Acquisition and Analysis,” Coordination and Administration of the Internet Workshop, Cambridge, MA., Sept. 8-10, 1996, (CAIDA Project), http://www.caida.org/.
-
(1996)
Coordination and Administration of the Internet Workshop
-
-
Monk, T.1
Claffy, K.2
-
21
-
-
84883386223
-
Abstraction-based Intrusion Detection in Distributed Environment
-
Nov
-
P. Ning, S. Jajodia, and X. S. Wang, “Abstraction-based Intrusion Detection in Distributed Environment”, ACM Trans. On Information and System Security, Nov. 2001, pp. 407-452.
-
(2001)
ACM Trans. On Information and System Security
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X. S.3
-
22
-
-
84942417880
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan, "COSSACK: Coordinated Suppression of Simultaneous Attacks," Proc. of DISCEX III, 2003, pp. 2-13.
-
(2003)
Proc. of DISCEX III
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
23
-
-
38049152816
-
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs
-
Australia, July 9-11
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs," The Eighth Australasian Conference on Information Security and Privacy (ACISP 2003), Australia, July 9-11, 2003.
-
(2003)
The Eighth Australasian Conference on Information Security and Privacy (ACISP 2003)
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
24
-
-
33845591142
-
DDoS-resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
-
Barcelona, April 23-29
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, “DDoS-resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection,” IEEE INFOCOM 2006, Barcelona, April 23-29, 2006.
-
(2006)
IEEE INFOCOM 2006
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
25
-
-
14944374980
-
Self-Configuring Network Traffic Generation
-
Taormina, Sicily, Italy, Oct. 25-27
-
J. Sommers and P. Barford, “Self-Configuring Network Traffic Generation,” in Proc. of ACM Internet Measurement Conference, Taormina, Sicily, Italy, Oct. 25-27, 2004.
-
(2004)
Proc. of ACM Internet Measurement Conference
-
-
Sommers, J.1
Barford, P.2
-
26
-
-
47749130236
-
DDoS Defense by Offense
-
Pisa, Italy, September
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker "DDoS Defense by Offense," ACM SIGCOMM 2006, Pisa, Italy, September 2006.
-
(2006)
ACM SIGCOMM 2006
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
27
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
Oct.-Dec
-
H. Wang, D. Zhang, and K. Shin, “Change-Point Monitoring for the Detection of DoS Attacks,” IEEE Trans. on Dependable and Secure Computing, Vol. 1, Oct.-Dec., 2004.
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
28
-
-
33745686749
-
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks
-
July
-
X. Wang, S. Chellappan, P. Boyer, and D. Xuan, “On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks,” IEEE Trans. on Parallel and Distributed Systems, Vol. 17, July 2006.
-
(2006)
IEEE Trans. on Parallel and Distributed Systems
, vol.17
-
-
Wang, X.1
Chellappan, S.2
Boyer, P.3
Xuan, D.4
|