메뉴 건너뛰기




Volumn , Issue , 2015, Pages 432-440

Inside booters: An analysis on operational databases

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; NETWORK MANAGEMENT; NETWORK SECURITY; WEBSITES;

EID: 84942615094     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.2015.7140320     Document Type: Conference Paper
Times cited : (21)

References (14)
  • 8
    • 85013635751 scopus 로고    scopus 로고
    • Rent to pwn: Analyzing commodity booter ddos services
    • M. Karami and D. McCoy, Rent to Pwn: Analyzing Commodity Booter DDoS Services, USENIX ;login:, 2013
    • (2013) USENIX ;Login
    • Karami, M.1    McCoy, D.2
  • 9
    • 84942587745 scopus 로고    scopus 로고
    • Prolexic, Prolexic Threat Adviory-DDoS Booter Shell Scripts, http://www.prolexic.com/kcresources/prolexicthreat-advisories/prolexic-threat-advisory-ddos Booterscripts 041912/Prolexic Threat Advisory DDoS Booter Scripts 052612.pdf
    • Prolexic Threat Adviory-DDoS Booter Shell Scripts
  • 13
    • 84942656800 scopus 로고    scopus 로고
    • B. Krebs, The Obscurest Epoch is Today, http://krebsonsecurity.com/2013/03/the-obscurest-epoch-is-today
    • Krebs, B.1
  • 14
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • P. Ferguson and D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, BCP 38, 2000
    • (2000) BCP , pp. 38
    • Ferguson, P.1    Senie, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.