-
1
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput
-
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34, 39-53 (2004)
-
(2004)
Commun. Rev
, vol.34
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
2
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools,and countermeasures
-
San Francisco, CA
-
Specht, S.M., Lee, R.B.: Distributed denial of service: taxonomies of attacks, tools, and countermeasures. In: Proceedings of the International Conference on Parallel and Distributed Computing (and Communications) Systems (ISCA PDCS), San Francisco, CA (2004)
-
(2004)
Proceedings of the International Conference on Parallel and Distributed Computing (And Communications) Systems (ISCA PDCS)
-
-
Specht, S.M.1
Lee, R.B.2
-
3
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks.ACM SIGCOMM Comput
-
Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev. 31(3), 38-47 (2001)
-
(2001)
Commun. Rev
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
5
-
-
85064040125
-
ZMap: Fast internet-wide scanningand its security applications
-
Washington, D.C., USA
-
Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: Proceedings of the 22nd USENIX Security Symposium, Washington, D.C., USA (2013)
-
(2013)
Proceedings of the 22Nd USENIX Security Symposium
-
-
Durumeric, Z.1
Wustrow, E.2
Halderman, J.A.3
-
6
-
-
84950330449
-
-
NICTER (http://www.nicter.jp/)
-
-
-
-
8
-
-
85055954491
-
Exit from hell? Reducing theimpact of amplification DDoS attacks
-
Kührer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of amplification DDoS attacks. In: Proceedings of the 23rd USENIX Security Symposium (2014)
-
(2014)
Proceedings of the 23Rd USENIX Security Symposium
-
-
Kührer, M.1
Hupperich, T.2
Rossow, C.3
Holz, T.4
-
10
-
-
84942615094
-
Inside booters: An analysis onoperational databases
-
Santanna, J., Durban, R., Sperotto, A., Pras, A.: Inside booters: an analysis on operational databases. In: 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015)
-
(2015)
14Th IFIP/IEEE International Symposium on Integrated Network Management (IM)
-
-
Santanna, J.1
Durban, R.2
Sperotto, A.3
Pras, A.4
-
11
-
-
84950330454
-
An early scale estimation of DRDoS attack monitoring honeypot traffic
-
Urakawa, J., Sawaya, Y., Yamada, A., Kubota, A., Makita, D., Yoshioka, K., Matsumoto, T.: An early scale estimation of DRDoS attack monitoring honeypot traffic. In: Proceedings of the 32nd Symposium on Cryptography and Information Security (2015)
-
(2015)
Proceedings of the 32Nd Symposium on Cryptography and Information Security
-
-
Urakawa, J.1
Sawaya, Y.2
Yamada, A.3
Kubota, A.4
Makita, D.5
Yoshioka, K.6
Matsumoto, T.7
-
12
-
-
85084096147
-
Tracking DDoS attacks: Insights into the business of disrupting the web
-
San Jose, CA, USA
-
Büscher, A., Holz, T.: Tracking DDoS attacks: insights into the business of disrupting the web. In: Proceedings of the 5th USENIX LEET, San Jose, CA, USA (2012)
-
(2012)
Proceedings of the 5Th USENIX LEET
-
-
Büscher, A.1
Holz, T.2
-
13
-
-
84910131344
-
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
-
ACM
-
Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 pound gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 435-448. ACM (2014)
-
(2014)
Proceedings of the 2014 Conference on Internet Measurement Conference
, pp. 435-448
-
-
Czyz, J.1
Kallitsis, M.2
Gharaibeh, M.3
Papadopoulos, C.4
Bailey, M.5
Karir, M.6
-
14
-
-
84910140759
-
DNSSEC and its potential for DDoSattacks - a comprehensive measurement study
-
Vancouver, BC, Canada. ACM Press
-
van Rijswijk-Deij, R., Sperotto, A., Pras, A.: DNSSEC and its potential for DDoS attacks - a comprehensive measurement study. In: Proceedings of the Internet Measurement Conference 2014, Vancouver, BC, Canada. ACM Press (2014)
-
(2014)
Proceedings of the Internetmeasurement Conference
, pp. 2014
-
-
Van Rijswijk-Deij, R.1
Sperotto, A.2
Pras, A.3
-
17
-
-
33750376598
-
The nepenthesplatform: An efficient approach to collect malware
-
In: Zamboni, D., Kruegel, C.(eds.), Springer, Heidelberg
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: an efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
-
(2006)
RAID 2006. LNCS
, vol.4219
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
-
18
-
-
33645791274
-
Honeycomb: Creating intrusion detection signaturesusing honeypots. ACM SIGCOMM Comput
-
Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput. Commun. Rev. 34, 51-56 (2004)
-
(2004)
Commun. Rev
, vol.34
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
|