-
2
-
-
0004194675
-
-
Internet-Draft, draft-ietf-itrace-01.txt, October Work in progress
-
S. Bellovin, M. Leech, and T. Taylor. The ICMP traceback message. Internet-Draft, draft-ietf-itrace-01.txt, October 2001. Work in progress, available at ftp://ftp.ietf.org/internet-drafts/draft-ietf-itrace-01.txt.
-
(2001)
The ICMP Traceback Message
-
-
Bellovin, S.1
Leech, M.2
Taylor, T.3
-
3
-
-
84992267980
-
Internet watch: Mapping the Internet
-
April
-
Hal Burch and Bill Cheswick. Internet watch: Mapping the Internet. Computer, 32(4):97-98, April 1999.
-
(1999)
Computer
, vol.32
, Issue.4
, pp. 97-98
-
-
Burch, H.1
Cheswick, B.2
-
5
-
-
84954415089
-
-
Caida. Skitter. http://www.caida.org/tools/measurement/skitter/ , 2000.
-
(2000)
Skitter
-
-
-
6
-
-
0003659019
-
-
Technical Report Carnegie Mellon University Pittsburgh, PA, September
-
Computer Emergency Response Team (CERT). TCP SYN flooding and IP spoofing attacks. Technical Report CA-96: 21, Carnegie Mellon University Pittsburgh, PA, September 1996.
-
(1996)
TCP SYN Flooding and IP Spoofing Attacks
-
-
-
7
-
-
84954414783
-
-
July
-
Internet Software Consortium. Internet domain survey host count. http://www.isc.org/ds/hosts.html , July 2002.
-
(2002)
Internet Domain Survey Host Count
-
-
-
12
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Ernest F. Brickell, editor
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, Advances in Cryptology - Crypto '92, pages 139-147, 1992.
-
(1992)
Advances in Cryptology - Crypto '92
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
14
-
-
2442572423
-
-
Internet mapping. http://research.lumeta.com/ches/map/ , 2002.
-
(2002)
Internet Mapping
-
-
-
16
-
-
84859691445
-
-
IETF working group
-
ICMP traceback (itrace). IETF working group, http://www.ietf.org/html.charters/itrace-charter.html.
-
ICMP Traceback (itrace)
-
-
-
19
-
-
0036349004
-
SAVE: Source address valididty enforcement protocol
-
April
-
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, and Lixia Zhang. SAVE: Source address valididty enforcement protocol. In Proceedings of IEEE INFO- COMM 2001, April 2001.
-
(2001)
Proceedings of IEEE INFO- COMM 2001
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
20
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker. Controlling high bandwidth aggregates in the network. CCR, 32(3):62-73, July 2002.
-
(2002)
CCR
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
21
-
-
84950242640
-
On design and evaluation ofintention-driven ICMP traceback
-
October
-
A. Mankin, D. Massey, C.L. Wu, S.F. Wu, and L. Zhang. On design and evaluation ofintention-driven ICMP traceback. In Proceedings of the IEEE International Conference on Computer Communications and Networks, October 2001.
-
(2001)
Proceedings of the IEEE International Conference on Computer Communications and Networks
-
-
Mankin, A.1
Massey, D.2
Wu, C.L.3
Wu, S.F.4
Zhang, L.5
-
24
-
-
0003375670
-
An analysis ofusing reflectors for distributed denial-of-service attacks
-
Vern Paxson. An analysis ofusing reflectors for distributed denial-of-service attacks. Computer Communication Review, 31(3), 2001.
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
26
-
-
0003602325
-
-
RFC 1321, Internet Activities Board, Internet Privacy Task Force, April
-
R. L. Rivest. The MD5 message digest algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
The MD5 Message Digest Algorithm
-
-
Rivest, R.L.1
-
28
-
-
0035361712
-
Network support for IP traceback
-
June
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Network support for IP traceback. ACM/ IEEE Transactions on Networking, 9(3), June 2001.
-
(2001)
ACM/ IEEE Transactions on Networking
, vol.9
, Issue.3
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
29
-
-
0030715989
-
Analysis ofa denial ofservice attack on TCP
-
May
-
Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, and Diego Zamboni. Analysis ofa denial ofservice attack on TCP. In Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1997.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
30
-
-
0034775309
-
Hash-based IP traceback
-
August
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer. Hash-based IP traceback. In Proceedings of the ACM SIGCOMM 2001 Conference, pages 3-14, August 2001.
-
(2001)
Proceedings of the ACM SIGCOMM 2001 Conference
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
31
-
-
0036947597
-
Single-packet IP traceback
-
December
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer. Single-packet IP traceback. IEEE/ ACM Transactions on Networking (ToN), 10(6), December 2002.
-
(2002)
IEEE/ ACM Transactions on Networking (ToN)
, vol.10
, Issue.6
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.T.7
Strayer, W.T.8
-
32
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
April
-
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOMM 2001, April 2001.
-
(2001)
Proceedings of IEEE INFOCOMM 2001
-
-
Song, D.X.1
Perrig, A.2
-
33
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
Denver, Colorado, August USENIX
-
Robert Stone. CenterTrack: An IP overlay network for tracking DoS floods. In Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, August 2000. USENIX.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Stone, R.1
|