-
1
-
-
84925414562
-
A multilayer overlay network architecture for enhancing IP services availability against DoS
-
ICISS, Kolkata, India, December
-
D. Geneiatakis, G. Portokalidis, A.D. Keromytis, A multilayer overlay network architecture for enhancing IP services availability against DoS, in: 7th International Conference,ICISS, Kolkata, India, December 2011.
-
(2011)
7th International Conference
-
-
Geneiatakis, D.1
Portokalidis, G.2
Keromytis, A.D.3
-
2
-
-
65249149520
-
To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
-
ACM
-
X. Liu, X. Yang, and Y. Lu To filter or to authorize: network-layer DoS defense against multimillion-node botnets ACM SIGCOMM Computer Communication Review 2008 ACM
-
(2008)
ACM SIGCOMM Computer Communication Review
-
-
Liu, X.1
Yang, X.2
Lu, Y.3
-
3
-
-
84913571552
-
-
arXiv preprint, August
-
P. Mittal, D. Kim, Y.C. Hu, M. Caesar, Mirage: Towards Deployable DDoS Defense for Web Applications, arXiv preprint, August 2012.
-
(2012)
Mirage: Towards Deployable DDoS Defense for Web Applications
-
-
Mittal, P.1
Kim, D.2
Hu, Y.C.3
Caesar, M.4
-
4
-
-
18744376590
-
Using graphic turing tests to counter automated DDoS attacks against web servers
-
ACM
-
W.G. Morein, A. Stavrou, D.L. Cook, A.D. Keromytis, V. Misra, and D. Rubenstein Using graphic turing tests to counter automated DDoS attacks against web servers 10th ACM Conference on CCS 2003 ACM
-
(2003)
10th ACM Conference on CCS
-
-
Morein, W.G.1
Stavrou, A.2
Cook, D.L.3
Keromytis, A.D.4
Misra, V.5
Rubenstein, D.6
-
5
-
-
84925414560
-
Of-guard: A DoS Attack Prevention Extension in Software-defined Networks
-
H. Wang, L. Xu, G. Gu, Of-guard: A DoS Attack Prevention Extension in Software-defined Networks, The Open Network Summit (ONS), 2014.
-
(2014)
The Open Network Summit (ONS)
-
-
Wang, H.1
Xu, L.2
Gu, G.3
-
7
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
IEEE
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur Bayesian event classification for intrusion detection Computer Security Applications Conference, 2003, Proceedings, 19th Annual 2003 IEEE
-
(2003)
Computer Security Applications Conference, 2003, Proceedings, 19th Annual
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
9
-
-
78651432290
-
Intrusion detection using continuous time bayesian networks
-
J. Xu, and C.R. Shelton Intrusion detection using continuous time bayesian networks J. Artif. Intell. Res. 2010
-
(2010)
J. Artif. Intell. Res.
-
-
Xu, J.1
Shelton, C.R.2
-
11
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J.G. Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield, Live migration of virtual machines, in: Proceedings of the 2nd Conference on Symposium NSDI, USENIX, 2005.
-
(2005)
Proceedings of the 2nd Conference on Symposium NSDI, USENIX
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
12
-
-
85175624225
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner Openflow: enabling innovation in campus networks ACM SIGCOMM Comput. Commun. Rev. 2008
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
14
-
-
84933530882
-
Approximating discrete probability distributions with dependence trees
-
C. Chow, and C. Liu Approximating discrete probability distributions with dependence trees IEEE Trans. Inform. Theory 1968
-
(1968)
IEEE Trans. Inform. Theory
-
-
Chow, C.1
Liu, C.2
-
16
-
-
0031274649
-
Wide-area internet traffic patterns and characteristics
-
K. Thompson, G. Miller, and R. Wilder Wide-area internet traffic patterns and characteristics IEEE Netw. 1997
-
(1997)
IEEE Netw.
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
19
-
-
84925414557
-
-
Floodlight OpenFlow Controller
-
Floodlight OpenFlow Controller. < http://floodlight.openflowhub.org >.
-
-
-
-
21
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and DDoS problems ACM Comput. Surv. 1 2007
-
(2007)
ACM Comput. Surv.
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
22
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
-
S. Zargar, J. Joshi, and D. Tipper A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun. Surv. Tutorials 2013
-
(2013)
IEEE Commun. Surv. Tutorials
-
-
Zargar, S.1
Joshi, J.2
Tipper, D.3
-
24
-
-
84866518191
-
A security enforcement kernel for openflow networks
-
ACM
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu A security enforcement kernel for openflow networks Proceedings of the 1st Workshop on HotSDN, SIGGCOMM 2012 ACM
-
(2012)
Proceedings of the 1st Workshop on HotSDN, SIGGCOMM
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
25
-
-
84920001288
-
Source address validation solution with openflow/noxarchitecture
-
G. Yao, J. Bi, P. Xiao, Source address validation solution with openflow/noxarchitecture, in: IEEE ICNP, 2011.
-
(2011)
IEEE ICNP
-
-
Yao, G.1
Bi, J.2
Xiao, P.3
-
26
-
-
84893570087
-
Fresco: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, M. Tyson, Fresco: modular composable security services for software-defined networks, in: Proceedings of NDSS, 2013.
-
(2013)
Proceedings of NDSS
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
27
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 2007
-
(2007)
Comput. Netw.
-
-
Patcha, A.1
Park, J.M.2
|