-
1
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
Abdelsayed, S., Glimsholt, D., Leckie, C., Ryan, S., and Shami, S. (2003). An efficient filter for denial-of-service bandwidth attacks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM'03), Volume 3, pp 1353-1357.
-
(2003)
Proceedings of IEEE Global Telecommunications Conference (GLOBECOM'03)
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
4
-
-
0036036742
-
-
October, In Proceedings of 18th ACM SOSP, Banff, Canada
-
Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., and Morris, R. (2001, October). Resilient overlay networks. In Proceedings of 18th ACM SOSP, pp. 131-145, Banff, Canada.
-
(2001)
Resilient Overlay Networks
, pp. 131-145
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, M.F.3
Morris, R.4
-
6
-
-
3242808612
-
2005 australian computer crime and security survey
-
Australian Computer Emergency Response Team
-
AusCERT. (2005). 2005 Australian computer crime and security survey. Tech. Report, Australian Computer Emergency Response Team. Available at http://www.auscert.org.au/crimesurvey
-
(2005)
Tech. Report
-
-
-
9
-
-
27544436002
-
-
February 10, Axent Security Team.
-
Barlow, J., and Thrower, W. (2000, February 10). TFN2K—an analysis. Axent Security Team. Available at http://security.royans.net/info/posts/bugtraq_ddos2.shtml
-
(2000)
TFN2K—an Analysis.
-
-
Barlow, J.1
Thrower, W.2
-
10
-
-
0038059205
-
Ip traceback with deterministic packet marking
-
Belenky, A., and Ansari, N. (2003). IP traceback with deterministic packet marking. IEEE Communication Letter, 7(4), 162-164.
-
(2003)
IEEE Communication Letter
, vol.7
, Issue.4
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
11
-
-
0004194675
-
-
Internet draft: draft-ietf-itrace-01.txt, work in progress
-
Bellovin, S., Leech, M., and Taylor, T. (2001, October). ICMP trace- back messages. Internet draft: draft-ietf-itrace-01.txt, work in progress.
-
(2001)
ICMP Trace- Back Messages.
-
-
Bellovin, S.1
Leech, M.2
Taylor, T.3
-
12
-
-
33646932291
-
Protection against ddos attacks based on traffic level measurements
-
San Diego, CA
-
Bencsath, B., and Vajda, I. (2004). Protection against DDoS attacks based on traffic level measurements. In Proceedings of the Western Simulation Multi Conference, San Diego, CA, pp. 22-28.
-
(2004)
Proceedings of the Western Simulation Multi Conference
, pp. 22-28
-
-
Bencsath, B.1
Vajda, I.2
-
13
-
-
1642535783
-
A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods
-
2001
-
Blazek, R.B., Kim, H., Rozovskii, B., and Tartakovsky, A. (2001). –A novel approach to detection of denial-of-service attacks via adaptive sequential and batch sequential change-point detection methods,— in Proceedings of IEEE Systems, Man and Cybernetics Information Assurance Workshop, pp. 220-226, 2001.
-
(2001)
Proceedings of IEEE Systems, Man and Cybernetics Information Assurance Workshop
, pp. 220-226
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Burton, H. Bloom. (1970, July). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM (CACM), 13(7), 422-426.
-
(1970)
Communications of the ACM (CACM)
, vol.13
, Issue.7
, pp. 422-426
-
-
Burton, H.B.1
-
15
-
-
33144489984
-
-
June), BCP40, RFC 2870.
-
Bush, R., Karrenberg, D., Kosters, M., and Plzak, R. (2000, June). Root name server operational requirements. BCP40, RFC 2870.
-
(2000)
Root Name Server Operational Requirements.
-
-
Bush, R.1
Karrenberg, D.2
Kosters, M.3
Plzak, R.4
-
16
-
-
85023951307
-
Knight.C sourcecode
-
July 11)
-
Bysin. (2001, July 11). Knight.c sourcecode. PacketStormSecurity.nl.
-
(2001)
Packetstormsecurity.Nl
-
-
-
17
-
-
85023949031
-
-
Available at http://packetstormsecurity.nl/distributed/knight.c
-
-
-
-
19
-
-
0009600844
-
-
CERT Coordination Center (1999). Denial of service tools. Available at http://www.cert.org/advisories/CA-1999-17.html
-
(1999)
Denial of Service Tools.
-
-
-
20
-
-
85023953007
-
-
CERT Coordination Center. (n.d.). Mail bomb attack. Available at http://www.cert.org/tech_tips/email_bombing_spamming.html
-
Mail Bomb Attack
-
-
-
21
-
-
84921023646
-
-
CERT Advisory CA-2001-20 Continuing threats to home users, 23.
-
CERT Coordination Center. (2001). Carnegie Mellon Software Engineering Institute, CERT Advisory CA-2001-20 Continuing threats to home users, 23. Available at http://www.cert.org/advisories/CA-2001-20.html
-
(2001)
Carnegie Mellon Software Engineering Institute
-
-
-
22
-
-
85023949198
-
-
CGI request attack. (n.d.). Available at
-
CERT Statistics. Available at http://www.cert.org/stats/cert_stats.html CGI request attack. (n.d.). Available at http://cpan.uwinnipeg.ca/htdocs/CGI.pm/CGI.html
-
-
-
-
23
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
TPDS-0228-0806
-
Chen, Y., Hwang, K., and Ku, W. (2007, December). Collaborative detection of DDoS attacks over multiple network domains. IEEE Transaction on Parallel and Distributed Systems, TPDS-0228-0806, 18(12).
-
(2007)
IEEE Transaction on Parallel and Distributed Systems
, vol.18
, Issue.12
-
-
Chen, Y.1
Hwang, K.2
Ku, W.3
-
24
-
-
0036967463
-
Use of spectral analysis in defense against dos attacks
-
Taipei, Taiwan
-
Cheng, C.M., Kung, H.T., and Tan, K.S. (2002). Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM 2002, Taipei, Taiwan, pp. 2143-2148.
-
(2002)
Proceedings of IEEE GLOBECOM 2002
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
25
-
-
33144480671
-
Denial of service against the domain name system
-
January/February
-
Cheung, S. (2006, January/February). Denial of service against the domain name system. IEEE Security & Privacy, 4(1), 40-45.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 40-45
-
-
Cheung, S.1
-
27
-
-
85025403958
-
An algebraic approach to ip traceback. Acm trans. inform
-
Dean, D., Franklin, M., and Stubblefield, A. (2002). An algebraic approach to IP traceback. ACM Trans. Inform. System Security, 5(2), 119-137.
-
(2002)
System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
28
-
-
0033293396
-
Towards a taxonomy of intrusion detection systems
-
Debar, H., Dacier, M., and Wespi, A. (1999). Towards a taxonomy of intrusion detection systems. Computer Networks, 31.
-
(1999)
Computer Networks
, pp. 31
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
29
-
-
0002562127
-
Analysis and simulation of a fair queuing algorithm
-
Demers, A., Keshav, S., and Shenker, S. (1990). Analysis and simulation of a fair queuing algorithm. Journal of Internetworking Research and Experience, 1(1), pp. 3-26.
-
(1990)
Journal of Internetworking Research and Experience
, vol.1
, Issue.1
, pp. 3-26
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
30
-
-
85006413597
-
Analyzing distributed denial of service tools: The shaft case
-
New Orleans, LA, December 3-8
-
Dietrich, S., Long, N., and Dittrich, D. (2000). Analyzing distributed denial of service tools: The Shaft case. In Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, LA, December 3-8, pp. 329-339.
-
(2000)
Proceedings of the 14Th Systems Administration Conference (LISA 2000)
, pp. 329-339
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
31
-
-
0006935026
-
-
May
-
Dittrich, D., Weaver, G., Dietrich, S., and Long, N. (2000, May). The –Mstream— distributed denial of service attack too. Available at http://staff.washington.edu/dittrich/misc/mstream.analysis.txt
-
(2000)
The –Mstream— Distributed Denial of Service Attack Too
-
-
Dittrich, D.1
Weaver, G.2
Dietrich, S.3
Long, N.4
-
35
-
-
33749051137
-
Ddos attacks and defense mechanisms: Classification
-
Darmstadt, Germany, December 14-17.
-
Douligeris, C., and Mitrokotsa, A. (2003). DDoS attacks and defense mechanisms: Classification. In Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 03), pp. 190-193, Darmstadt, Germany, December 14-17.
-
(2003)
Proceedings of the 3Rd IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 03)
, pp. 190-193
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
36
-
-
1242321281
-
Ddos attacks and defense mechanisms: Classification and state-of-the-art
-
Douligeris, C., and Mitrokotsa, A. (2004, April). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643-666.
-
(2004)
Computer Networks
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
37
-
-
84893112026
-
-
Network Computing Unix World.
-
Farrow, R. (n.d.). TCP SYN Flooding attacks and remedies. Network Computing Unix World. Available at http://www.networkcomputing. com/unixworld/security/004/004.txt.html
-
TCP SYN Flooding Attacks and Remedies
-
-
Farrow, R.1
-
38
-
-
84942256107
-
Statistical approaches to ddos attack detection and response
-
Feinstein, L., Schnackenberg, D., Balupari, R., and Kindred, D. (2003). Statistical approaches to DDoS attack detection and response. In Proceedings of DISCEX'03, Washington, DC, Vol. 1, pp. 303-314.
-
(2003)
Proceedings of DISCEX'03, Washington, DC
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
39
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
Ferguson, P., and Senie, D. (2001). Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827.
-
(2001)
RFC
, pp. 2827
-
-
Ferguson, P.1
Senie, D.2
-
40
-
-
0027647490
-
Random early detection gateways for congestion avoidance
-
Floyd, S., and Jacobon, V. (1993). Random early detection gateways for congestion avoidance. IEEE/ACM Trans. on Networking, 1(4), 397-413.
-
(1993)
IEEE/ACM Trans. on Networking
, vol.1
, Issue.4
, pp. 397-413
-
-
Floyd, S.1
Jacobon, V.2
-
41
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the internet
-
Floyd, S., and Fall, K. (1999, August). Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 7(4), 458-472.
-
(1999)
IEEE/ACM Trans. on Networking
, vol.7
, Issue.4
, pp. 458-472
-
-
Floyd, S.1
Fall, K.2
-
42
-
-
1242282792
-
Pushback messages for controlling aggregates in the network
-
Floyd, S., Bellovin, S., Loannidis, J., Kompella, K., Mahajan, R., and Paxson, V. (2001). Pushback messages for controlling aggregates in the network. Available at draft-floyd-pushback-messages-00.txt
-
(2001)
Available at Draft-Floyd-Pushback-Messages-00.Txt
-
-
Floyd, S.1
Bellovin, S.2
Loannidis, J.3
Kompella, K.4
Mahajan, R.5
Paxson, V.6
-
44
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
Garber, L. (2000, April). Denial-of-service attacks rip the Internet. IEEE Computer, 33(4), 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
45
-
-
0034229418
-
Defeating distributed denial of service attacks
-
Geng, X., and Whinston, A.B. (2000). Defeating distributed denial of service attacks. IEEE IT Professional, 2(4), 36-42.
-
(2000)
IEEE IT Professional
, vol.2
, Issue.4
, pp. 36-42
-
-
Geng, X.1
Whinston, A.B.2
-
47
-
-
85084163167
-
(2001). multops: A data-structure for bandwidth attack detection
-
Washington, DC
-
Gil, T.M., and Poletto, M. (2001). Multops: A data-structure for bandwidth attack detection. In Proceedings of the 10th USENIX Security Symposium, Washington, DC, pp. 23-38.
-
Proceedings of the 10Th USENIX Security Symposium
, pp. 23-38
-
-
Gil, T.M.1
Poletto, M.2
-
50
-
-
24344440328
-
-
Tech. Report, Computer Security Institute. Available at
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R. (2005). 2005 CSI/FBI computer crime and security survey. Tech. Report, Computer Security Institute. Available at www.GCSI.com
-
(2005)
2005 CSI/FBI Computer Crime and Security Survey.
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
51
-
-
79955120571
-
An isp level solution to combat ddos attacks using combined statistical based approach
-
Gupta, B.B., Misra, M. and Joshi, R.C. (2008). An ISP level solution to combat DDoS attacks using combined statistical based approach. International Journal of Information Assurance and Security (JIAS), 3(2), 102-110.
-
(2008)
International Journal of Information Assurance and Security (JIAS)
, vol.3
, Issue.2
, pp. 102-110
-
-
Gupta, B.B.1
Misra, M.2
Joshi, R.C.3
-
52
-
-
66649133397
-
Fvba: A combined statistical approach for low rate degrading and high bandwidth disruptive ddos attacks detection in isp domain
-
New Delhi, India, Dec. 12-14
-
Gupta, B.B., Misra, M., and Joshi, R.C. (2008). FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. In Proceedings of 16th IEEE International Conference On Networks (ICON-2008), New Delhi, India, Dec. 12-14, pp. 34-37.
-
(2008)
Proceedings of 16Th IEEE International Conference on Networks (ICON-2008)
, pp. 34-37
-
-
Gupta, B.B.1
Misra, M.2
Joshi, R.C.3
-
53
-
-
85023946934
-
Distributed approach to detect ddos attacks in isp domain using entropy
-
Gupta, B.B., Kumar, K., Singh, K., and Joshi, R.C. (2007). Distributed approach to detect DDoS attacks in ISP domain using entropy. In Proceedings of International Conference on Advanced Communication System (ICACS-2007), India, pp. 101-108.
-
(2007)
In Proceedings of International Conference on Advanced Communication System (ICACS-2007), India
, pp. 101-108
-
-
Gupta, B.B.1
Kumar, K.2
Singh, K.3
Joshi, R.C.4
-
54
-
-
1242327641
-
Trinity v3, a ddos tool, hits the streets
-
Hancock, B. (2000). Trinity v3, a DDoS tool, hits the streets. Computers Security, 19(7), 574.
-
(2000)
Computers Security
, vol.19
, Issue.7
, pp. 574
-
-
Hancock, B.1
-
59
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
Hwang, K., Cai, M., Chen, Y., and Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transaction on Dependable and Secure Computing, 4(1), 41-55.
-
(2007)
IEEE Transaction on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
60
-
-
85023948275
-
-
IRC Security. (n.d.). Available at http://www.irchelp.org/irchelp/security
-
-
-
-
61
-
-
85023913738
-
-
J-063: Domain name system (DNS) denial of service (DoS) attacks. (1999). Available at http://www.securityfocus.com/advisories/1727
-
(1999)
-
-
-
62
-
-
85023958311
-
-
Javvin network management & security. (n.d.). UDP Flood attack. Available at http://www.javvin.com/networkSecurity/UDPFloodAttack.html
-
UDP Flood Attack
-
-
-
64
-
-
33744945767
-
Sos: Secure overlay services
-
Keromytis, A.D., Misra, V., and Rubenstein, D. (2002). SOS: Secure overlay services. In Proceedings of ACM SIGCOMM, pp. 61-72.
-
(2002)
In Proceedings of ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
65
-
-
84893960790
-
Proactive server roaming for mitigating denial of service attacks
-
Newark, NJ
-
Khattab, S.M., Sangpachatanaruk, C., Melhem, R., Mosse, D., and Znati, T. (2003, August). Proactive server roaming for mitigating denial of service attacks. In Proceedings of the 1st International Conference on International Technology: Research and Education (ITRE 03), Newark, NJ, pp. 500-504.
-
(2003)
Proceedings of the 1St International Conference on International Technology: Research and Education (ITRE 03)
, pp. 500-504
-
-
Khattab, S.M.1
Sangpachatanaruk, C.2
Melhem, R.3
Mosse, D.4
Znati, T.5
-
67
-
-
84856757768
-
An integrated approach for defending against distributed denial-of-service (Ddos) attacks
-
Kumar, K., Joshi, R.C., and Singh, K. (2006). An integrated approach for defending against distributed denial-of-service (DDoS) attacks. In Proceedings of IRISS-2006, IIT Madras. Available at www.cs.iitm.ernet.in/-iriss06/iitr_krishan.pdf
-
(2006)
Proceedings of IRISS-2006, IIT Madras
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
68
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Lakhina, A., Crovella, M., and Diot, C. (2005). Mining anomalies using traffic feature distributions. ACM SIGCOMM Computer Communication Review, 35(4), 217-228.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
69
-
-
0034497721
-
Distributed denial of service attacks
-
Lau, F., Stuart, R.H., Michael, S.H., et al. (2000). Distributed denial of service attacks. In Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, Vol.3, pp. 2275-2280.
-
(2000)
Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN
, vol.3
, pp. 2275-2280
-
-
Lau, F.1
Stuart, R.H.2
Michael, S.H.3
-
70
-
-
1242350164
-
Taxonomies of distributed denial of service networks, attacks, tools and countermeasures
-
Available at
-
Lee, R.B. (2003). Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. Princeton University. Available at http://www.ee.princeton.edu/-rblee
-
(2003)
Princeton University
-
-
Lee, R.B.1
-
71
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
May 9-12
-
Lee, W., Stolfo, S.J., and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, pp. 120-132.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
72
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems. Acm trans
-
Lee, W., and Stolfo, S. (2000). A framework for constructing features and models for intrusion detection systems. ACM Trans. Information and System Security (TISSEC), 3(4), 227-261.
-
(2000)
Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
74
-
-
1842622777
-
A brief history of the internet
-
Leiner, B.M., Cerf, V.G., et. al. (2003). A brief history of the Internet. Internet Society. Available at http://www.isoc.org
-
(2003)
Internet Society
-
-
Leiner, B.M.1
Cerf, V.G.2
-
75
-
-
59249106247
-
Ddos attacks detection model and its applications
-
Li, M., Li, M., and Jiang, X. (2008). DDoS attacks detection model and its applications. WSEAS Transactions on Computers, 7(8), 1159-1168.
-
(2008)
WSEAS Transactions on Computers
, vol.7
, Issue.8
, pp. 1159-1168
-
-
Li, M.1
Li, M.2
Jiang, X.3
-
76
-
-
0036349004
-
Save: Source address validity enforcement protocol
-
Li, J., Mirkovic, J., Wang, M., Reiher P., and Zhang, L. (2002). SAVE: Source address validity enforcement protocol. In Proceedings of IEEE INFOCOM, pp. 1557-1566.
-
(2002)
In Proceedings of IEEE INFOCOM
, pp. 1557-1566
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
80
-
-
84983188846
-
-
McAfee. (n.d.) Personal Firewall. Available at http://www.mcafee.com/myapps/firewal l/ov_f irewall.asp
-
Personal Firewall
-
-
-
81
-
-
0025558418
-
Stochastic fairness queuing
-
Piscataway, NJ
-
Mckenny, P. (1990). Stochastic fairness queuing. In Proceeding of IEEE INFOCOM, Piscataway, NJ, pp. 733-740.
-
(1990)
Proceeding of IEEE INFOCOM
, pp. 733-740
-
-
McKenny, P.1
-
82
-
-
84904888755
-
Attacking ddos at the source
-
Paris, France
-
Mirkovic, J., Prier, G., and Reiher, P. (2002). Attacking DDoS at the source. In Proceedings of ICNP-2002, Paris, France, pp. 312-321.
-
(2002)
Proceedings of ICNP-2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
83
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Mirkovic, J., and Reiher, P. (2004, April). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communications Review, 34(2), 39-53.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
84
-
-
17644427757
-
Forming alliance for ddos defenses
-
ACM Press, New York, NY, August
-
Mirkovic, J., Robinson, M., and Reiher, P. (2003). Forming alliance for DDoS defenses. In Proceedings of New Security Paradigmes Workshop (NSPW 2003), ACM Press, New York, NY, August 11-18.
-
(2003)
Proceedings of New Security Paradigmes Workshop (NSPW 2003)
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
85
-
-
29244465140
-
Mitigating denial of service attacks: A tutorial
-
Molsa, J. (2005). Mitigating denial of service attacks: A tutorial. Journal of Computer Security, 13, 807-837.
-
(2005)
Journal of Computer Security
, vol.13
, pp. 807-837
-
-
Molsa, J.1
-
86
-
-
33745205813
-
Inferring internet denial-of-service activity
-
Moore, D., Shannon, C., Brown, D.J., Voelker, G., and Savage, S. (2006). Inferring Internet denial-of-service activity. ACM Transactions on Computer Systems, 24(2), 115-139.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.4
Savage, S.5
-
87
-
-
0031140709
-
Internet security: Firewall and beyond
-
Oppliger, R. (1997). Internet security: Firewall and beyond. Communications of the ACM, 40(5), 92-102.
-
(1997)
Communications of the ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Oppliger, R.1
-
88
-
-
84942417880
-
Cossack: Coordinated suppression of simultaneous attacks
-
Papadopoulos, C., Lindell, R., Mehringer, J., Hussain, A., and Govindan, R. (2003, April). COSSACK: Coordinated suppression of simultaneous attacks. In Proceedings of the DARPA Information Survivability Conference and Exposition, Vol. 1, pp. 2-13.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
89
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets
-
ACM Press, New York, pp
-
Park, K., and Lee, H. (2001). On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, pp. 15-26, 2001.
-
(2001)
Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, vol.15-26
, pp. 2001
-
-
Park, K.1
Lee, H.2
-
90
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of- service attacks
-
Paxson, V. (2001). An analysis of using reflectors for distributed denial-of- service attacks. ACM SIGCOMM Computer Communications Review (CCR), 31(3), 38-47.
-
(2001)
ACM SIGCOMM Computer Communications Review (CCR)
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
92
-
-
0038729330
-
Protection from distributed denial of service attack using history-based ip filtering
-
Peng, T., Leckie, C., and Ramamohanarao, K. (2003). Protection from distributed denial of service attack using history-based IP filtering. In Proceedings of IEEE International Conference on Communications (ICC2003), Anchorage, AL, Volume 1, pp. 482-486.
-
(2003)
Proceedings of IEEE International Conference on Communications (ICC2003), Anchorage, AL
, vol.1
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
93
-
-
21144433105
-
Six sigma: Concepts, tools, and applications
-
Raisinghani, M.S., Ette, H., Pierce, R., Cannon, G., and Daripaly, P. (2005). Six Sigma: concepts, tools, and applications. Journal of Industrial Management & Data Systems, 105(4), 491-505.
-
(2005)
Journal of Industrial Management & Data Systems
, vol.105
, Issue.4
, pp. 491-505
-
-
Raisinghani, M.S.1
Ette, H.2
Pierce, R.3
Cannon, G.4
Daripaly, P.5
-
95
-
-
47649083043
-
Challenges and principles of ddos defense
-
Robinson, M., Mirkovic, J., Schnaider, M., Michel, S., and Reiher, P. (2003). Challenges and principles of DDoS defense. SIGCOMM.
-
(2003)
SIGCOMM.
-
-
Robinson, M.1
Mirkovic, J.2
Schnaider, M.3
Michel, S.4
Reiher, P.5
-
97
-
-
0033650584
-
Practical network support for ip traceback
-
August, 2000, Stockholm, Sweden
-
Savage, S., Wetherall, D., Karlin, A., and Anderson, T. (2000, August). Practical network support for IP traceback. In Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, pp. 295-306.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
98
-
-
85023911937
-
Recent dns reflector attacks
-
Available at
-
Scalzo, F. (2006). Recent DNS reflector attacks. VeriSign. Available at http://www.nanog.org/mtg-0606/pdf/frank-scalzo.pdf
-
(2006)
Verisign
-
-
Scalzo, F.1
-
99
-
-
0030715989
-
-
May, In Proceedings of the 1997 IEEE Symposium on Security and Privacy.
-
Schuba, C., Krsul, I., Kuhn, M., Spafford, G., Sundaram, A., and Zamboni, D. (1997, May). Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy.
-
(1997)
Analysis of a Denial of Service Attack on TCP.
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, G.4
Sundaram, A.5
Zamboni, D.6
-
100
-
-
85023903724
-
Using network management system to detect distributed denial of service attacks
-
Naval Postgraduate School Monterey, CA
-
Singh Negi, C. (2001, September). Using network management system to detect distributed denial of service attacks. Master's thesis, Naval Postgraduate School Monterey, CA.
-
(2001)
Master's Thesis
-
-
Singh Negi, C.1
-
101
-
-
0034775309
-
Hash-based ip traceback
-
San Diego, CA
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., and Strayer, W.T. (2001, August). Hash-based IP traceback. In Proceedings of ACM SIGCOMM 2001, San Diego, CA, pp. 3-14.
-
(2001)
Proceedings of ACM SIGCOMM 2001
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
102
-
-
0034997397
-
Advanced and authenticated marking schemes for ip t raceback
-
Song, D.X., and Perrig, A. (2001). Advanced and authenticated marking schemes for IP T raceback. In Proceedings of IEEE INFOCOM, pp. 878-886.
-
(2001)
In Proceedings of IEEE INFOCOM
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
103
-
-
85023947722
-
-
Teardrop attacks. (n.d.). Available at http://www.physnet.uni-hamburg. de/physnet/security/vulnerability/teardrop.html
-
-
-
-
104
-
-
85023908152
-
-
The ISC Internet Domain Survey. Available at https://www.isc.org/solutions/survey
-
-
-
-
106
-
-
85023919329
-
-
Wikipedia. (n.d.). DNS request attack. Available at http://en.wikipedia. org/wiki/DNS_cache_poisoning
-
DNS Request Attack
-
-
-
107
-
-
85023941130
-
-
Wikipedia. (n.d.). LAND attack. Available at http://en.wikipedia.org/wiki/LAND
-
LAND Attack
-
-
-
108
-
-
28844439716
-
A survey of active and passive defense mechanisms against ddos attacks. Technical report, tr c04/02
-
Deakin University, Australia
-
Xiang, Y., Zhou, W., and Chowdhury, M. (2004). A survey of active and passive defense mechanisms against DDoS attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia.
-
(2004)
School of Information Technology
-
-
Xiang, Y.1
Zhou, W.2
Chowdhury, M.3
|