-
1
-
-
0028532812
-
Denial of service: An example
-
November
-
Roger M. Needham, "Denial of service: An example," Communications of the ACM, vol. 37, no. 11, pp. 42-46, November 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
2
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
April
-
Lee Garber, "Denial-of-service attacks rip the Internet," IEEE Computer, vol. 33, no. 4, pp. 12-17, April 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
5
-
-
84950284911
-
Smurf IP denial-of-service attacks
-
January
-
"Smurf IP denial-of-service attacks," CERT Advisory CA-98.01, January 1998, available at http://www.cert.org/advisories/CA-98.01.smurf.html.
-
(1998)
CERT Advisory CA-98.01
-
-
-
6
-
-
84890503292
-
Applications of sampling methodologies to network traffic characterization
-
Kimberly C. Claffy, George C. Polyzos, and Hans-Werner Braun, "Applications of sampling methodologies to network traffic characterization," Computer Communication Review, vol. 23, no. 4, pp. 194-203, 1993.
-
(1993)
Computer Communication Review
, vol.23
, Issue.4
, pp. 194-203
-
-
Claffy, K.C.1
Polyzos, G.C.2
Braun, H.-W.3
-
7
-
-
0032321028
-
Adaptive sampling methods to determine network traffic statistics including the hurst parameter
-
October
-
Jack Drobisz and Kenneth J. Christensen, "Adaptive sampling methods to determine network traffic statistics including the hurst parameter," in Proceedings of LCN'98, October 1998, pp. 238-247.
-
(1998)
Proceedings of LCN'98
, pp. 238-247
-
-
Drobisz, J.1
Christensen, K.J.2
-
8
-
-
0034300783
-
Towards trapping wily intruders in the large
-
Glenn Mansfield, Kohei Ohta, Y. Takei, N. Kato, and Y. Nemoto, "Towards trapping wily intruders in the large," Computer Networks, vol. 34, pp. 659-670, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 659-670
-
-
Mansfield, G.1
Ohta, K.2
Takei, Y.3
Kato, N.4
Nemoto, Y.5
-
9
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
Woburn, MA, August
-
Joao B. D. Cabrera, B. Ravichandran, and Raman K. Mehra, "Statistical traffic modeling for network intrusion detection," in Proceedings. 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Woburn, MA, August 2000, pp. 466-473.
-
(2000)
Proceedings. 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
10
-
-
84950289497
-
-
Internet draft draft-vshah-ddos-smurf-00.txt, April
-
V. Shah, "Preventing DDoS smurf attacks," Internet draft draft-vshah-ddos-smurf-00.txt, April 2000.
-
(2000)
Preventing DDoS Smurf Attacks
-
-
Shah, V.1
-
11
-
-
0002767660
-
Defending against denial of service attacks in Scout
-
New Orleans, LA, February
-
Oliver Spatscheck and Larry L. Peterson, "Defending against denial of service attacks in Scout," in Proceedings of the Third Symposium on Operating Systems and Implementations (OSDI '99), New Orleans, LA, February 1999, pp. 59-72.
-
(1999)
Proceedings of the Third Symposium on Operating Systems and Implementations (OSDI '99)
, pp. 59-72
-
-
Spatscheck, O.1
Peterson, L.L.2
-
12
-
-
85034043506
-
Protecting web servers from distributed denial of service attacks
-
Hong Kong, China, May
-
Frank Kargi, Joern Maier, and Michael Weber, "Protecting web servers from distributed denial of service attacks," in Proceedings of the 10th International World Wide Web Conference, Hong Kong, China, May 2001, pp.514-524.
-
(2001)
Proceedings of the 10th International World Wide Web Conference
, pp. 514-524
-
-
Kargi, F.1
Maier, J.2
Weber, M.3
-
13
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Anchorage, Alaska, April
-
D. X. Song and A. Perring, "Advanced and authenticated marking schemes for IP traceback," in Proceedings. IEEE INFOCOM 2001, Anchorage, Alaska, April 2001, pp. 878-886.
-
(2001)
Proceedings. IEEE INFOCOM 2001
, pp. 878-886
-
-
Song, D.X.1
Perring, A.2
-
14
-
-
0035010963
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
-
Anchorage, Alaska, April
-
Kihong Park and Heejo Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," in Proceedings. IEEE INFOCOM 2001, Anchorage, Alaska, April 2001, pp. 338-347.
-
(2001)
Proceedings. IEEE INFOCOM 2001
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
15
-
-
0033650584
-
Pratical network support for IP traceback
-
Stockholm Sweden, August
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson, "Pratical network support for IP traceback," in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication,, Stockholm Sweden, August 2000, pp. 295-306.
-
(2000)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
16
-
-
0032594135
-
Prompting the use of end-to-end congestion in the Internet
-
August
-
Sally Floyd and Kevin Fall, "Prompting the use of end-to-end congestion in the Internet," IEEE/ACM Transcations on Networking, August 1999.
-
(1999)
IEEE/ACM Transcations on Networking
-
-
Floyd, S.1
Fall, K.2
-
17
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
August
-
Sally Floyd and Van Jacobson, "Random early detection gateways for congestion avoidance," IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp. 397-413, August 1993.
-
(1993)
IEEE/ACM Transactions on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobson, V.2
|