-
1
-
-
85076318638
-
-
Bohatei. https://github.com/ddos-defense/bohatei.
-
-
-
-
2
-
-
84885573531
-
-
Amazon EC2. http://aws.amazon.com/ec2/.
-
Amazon EC2
-
-
-
8
-
-
85076313299
-
-
CloudFlare. https://www.cloudflare.com/ddos.
-
CloudFlare
-
-
-
11
-
-
85048694438
-
-
GSA Advantage. http://1.usa.gov/1ggEgFN.
-
GSA Advantage
-
-
-
13
-
-
85076320316
-
-
iptables. http://www.netfilter.org/projects/iptables/.
-
-
-
-
16
-
-
85076265760
-
-
Open vSwitch. http://openvswitch.org/.
-
-
-
-
19
-
-
85076303453
-
-
Prolexic. http://www.prolexic.com/.
-
-
-
-
20
-
-
85076306197
-
-
Radware. http://www.radware.com/Solutions/Security/.
-
-
-
-
22
-
-
85043291244
-
-
Topology Zoo. www.topology-zoo.org.
-
Topology Zoo
-
-
-
25
-
-
35048820228
-
Mayday: Distributed filtering for internet services
-
D. G. Andersen. Mayday: Distributed filtering for internet services. In Proc. USITS, 2003.
-
(2003)
Proc. USITS
-
-
Andersen, D.G.1
-
26
-
-
58049195641
-
Accountable internet protocol (AIP)
-
D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable internet protocol (AIP). In Proc. SIGCOMM, 2008.
-
(2008)
Proc. SIGCOMM
-
-
Andersen, D.G.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
28
-
-
0002575123
-
Web proxy caching: The devil is in the details
-
Dec
-
R. Cáceres, F. Douglis, A. Feldmann, G. Glass, and M. Rabinovich. Web proxy caching: The devil is in the details. SIGMETRICS Perform. Eval. Rev., 26(3):11–15, Dec. 1998.
-
(1998)
SIGMETRICS Perform. Eval. Rev.
, vol.26
, Issue.3
, pp. 11-15
-
-
Cáceres, R.1
Douglis, F.2
Feldmann, A.3
Glass, G.4
Rabinovich, M.5
-
30
-
-
84910131344
-
Taming the 800 pound gorilla: The rise and decline of ntp ddos attacks
-
J. Czyz, M. Kallitsis, M. Gharaibeh, C. Papadopoulos, M. Bailey, and M. Karir. Taming the 800 pound gorilla: The rise and decline of ntp ddos attacks. In Proc. IMC, 2014.
-
(2014)
Proc. IMC
-
-
Czyz, J.1
Kallitsis, M.2
Gharaibeh, M.3
Papadopoulos, C.4
Bailey, M.5
Karir, M.6
-
31
-
-
85071935677
-
Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags
-
S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags. In Proc. NSDI, 2014.
-
(2014)
Proc. NSDI
-
-
Fayazbakhsh, S.K.1
Chiang, L.2
Sekar, V.3
Yu, M.4
Mogul, J.C.5
-
32
-
-
85076267308
-
A clean slate 4D approach to network control and management
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A clean slate 4D approach to network control and management. ACM CCR, 2005.
-
(2005)
ACM CCR
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
34
-
-
84883290864
-
B4: Experience with a globally-deployed software defined wan
-
Jain et al. B4: Experience with a globally-deployed software defined wan. In Proc. SIGCOMM, 2013.
-
(2013)
Proc. SIGCOMM
-
-
Jain1
-
35
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed ddos traffic
-
C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: An effective defense against spoofed ddos traffic. In Proc. CCS, 2003.
-
(2003)
Proc. CCS
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
36
-
-
24644463787
-
Efficient algorithms for online decision problems
-
A. Kalai and S. Vempala. Efficient algorithms for online decision problems. J. Comput. Syst. Sci., 2005.
-
(2005)
J. Comput. Syst. Sci.
-
-
Kalai, A.1
Vempala, S.2
-
38
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. In Proc. SIGCOMM, 2005.
-
(2005)
Proc. SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
39
-
-
1242263196
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan et al. Controlling high bandwidth aggregates in the network. CCR, 2001.
-
(2001)
CCR
-
-
Mahajan, R.1
-
40
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
March
-
N. McKeown et al. OpenFlow: enabling innovation in campus networks. CCR, March 2008.
-
(2008)
CCR
-
-
McKeown, N.1
-
41
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. In CCR, 2004.
-
(2004)
CCR
-
-
Mirkovic, J.1
Reiher, P.2
-
42
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 2006.
-
(2006)
ACM Trans. Comput. Syst.
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
45
-
-
84883284665
-
Ananta: Cloud scale load balancing
-
P. Patel et al. Ananta: cloud scale load balancing. In Proc. ACM SIGCOMM, 2013.
-
(2013)
Proc. ACM SIGCOMM
-
-
Patel, P.1
-
46
-
-
0033295259
-
BrO: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
47
-
-
85076880509
-
Arrakis: The operating system is the control plane
-
S. Peter, J. Li, I. Zhang, D. R. K. Ports, D. Woos, A. Krishnamurthy, T. Anderson, and T. Roscoe. Arrakis: The operating system is the control plane. In Proc. OSDI, 2014.
-
(2014)
Proc. OSDI
-
-
Peter, S.1
Li, J.2
Zhang, I.3
Ports, D.R.K.4
Woos, D.5
Krishnamurthy, A.6
Anderson, T.7
Roscoe, T.8
-
48
-
-
85090433665
-
SnORT - Lightweight intrusion detection for networks
-
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In LISA, 1999.
-
(1999)
LISA
-
-
Roesch, M.1
-
49
-
-
85180629124
-
Amplification hell: Revisiting network protocols for ddos abuse
-
C. Rossow. Amplification hell: Revisiting network protocols for ddos abuse. In Proc. USENIX Security, 2014.
-
(2014)
Proc. USENIX Security
-
-
Rossow, C.1
-
50
-
-
84891354309
-
Simplifying the synthesis of internet traffic matrices
-
M. Roughan. Simplifying the Synthesis of Internet Traffic Matrices. ACM SIGCOMM CCR, 2005.
-
(2005)
ACM SIGCOMM CCR
-
-
Roughan, M.1
-
52
-
-
65249174985
-
-
Technical Report CMU-CS-06-114, School of Computer Science, Carnegie Mellon University
-
E. Shi, I. Stoica, D. Andersen, and A. Perrig. OverDoSe: A generic DDoS protection service using an overlay network. Technical Report CMU-CS-06-114, School of Computer Science, Carnegie Mellon University, 2006.
-
(2006)
OverDoSe: A Generic DDoS Protection Service Using An Overlay Network
-
-
Shi, E.1
Stoica, I.2
Andersen, D.3
Perrig, A.4
-
53
-
-
84893570087
-
FRESCO: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. FRESCO: Modular composable security services for software-defined networks. In Proc. NDSS, 2013.
-
(2013)
Proc. NDSS
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
54
-
-
84889062725
-
AvaNT-Guard: Scalable and vigilant switch flow management in software-defined networks
-
S. Shin, V. Yegneswaran, P. Porras, and G. Gu. AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks. In Proc. CCS, 2013.
-
(2013)
Proc. CCS
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
56
-
-
84907337343
-
Network virtualization in multi-tenant datacenters
-
T. Koponen et al. Network virtualization in multi-tenant datacenters. In Proc. NSDI, 2014.
-
(2014)
Proc. NSDI
-
-
Koponen, T.1
-
57
-
-
85160719220
-
Wresting control from BGP: Scalable Fine-grained Route Control
-
P. Verkaik, D. Pei, T. Schollf, A. Shaikh, A. C. Snoeren, and J. E. van der Merwe. Wresting Control from BGP: Scalable Fine-grained Route Control. In Proc. USENIX ATC, 2007.
-
(2007)
Proc. USENIX ATC
-
-
Verkaik, P.1
Pei, D.2
Schollf, T.3
Shaikh, A.4
Snoeren, A.C.5
Van Der Merwe, J.E.6
-
60
-
-
80051959854
-
ScioN: Scalability, control, and isolation on next-generation networks
-
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D. G. Andersen. Scion: Scalability, control, and isolation on next-generation networks. In Proc. IEEE Security and Privacy, 2011.
-
(2011)
Proc. IEEE Security and Privacy
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
Chan, H.4
Perrig, A.5
Andersen, D.G.6
|