-
1
-
-
85094663859
-
-
CAIDA Report
-
CAIDA Report. http://www.caida.org/analysis/AIX/plen_hist/, 2000.
-
(2000)
-
-
-
2
-
-
85050149881
-
Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks
-
K. Argyraki and D. Cheriton. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX, 2005.
-
(2005)
USENIX
-
-
Argyraki, K.1
Cheriton, D.2
-
3
-
-
34748848955
-
Ingress Filtering for Multihomed Networks
-
RFC 3704
-
F. Baker and P. Savola. Ingress Filtering for Multihomed Networks. RFC 3704, 2004.
-
(2004)
-
-
Baker, F.1
Savola, P.2
-
7
-
-
33749858184
-
The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet
-
R. Beverly and S. Bauer. The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet. In USENIX SRUTI, 2005.
-
(2005)
USENIX SRUTI
-
-
Beverly, R.1
Bauer, S.2
-
8
-
-
0010020069
-
UMAC: Fast and Secure Message Authentication
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and Secure Message Authentication. In Advances in Cryptology - CRYPTO'99, 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
9
-
-
85092759913
-
Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection
-
M. Casado, A. Akella, P. Cao, N. Provos, and S. Shenker. Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection. In USENIX SRUTI, 2006.
-
(2006)
USENIX SRUTI
-
-
Casado, M.1
Akella, A.2
Cao, P.3
Provos, N.4
Shenker, S.5
-
11
-
-
85094663824
-
-
Deterlab
-
Deterlab. http://www.deterlab.net/.
-
-
-
-
13
-
-
0010057139
-
Analysis of the Autonomous System Network Topology
-
July
-
D.Magoni and J.J.Pansiot. Analysis of the Autonomous System Network Topology. ACM SIGCOMM CCR, 31(3), July 2001.
-
(2001)
ACM SIGCOMM CCR
, vol.31
, Issue.3
-
-
Magoni, D.1
Pansiot, J.J.2
-
14
-
-
39049160574
-
Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
-
Z. Duan, X. Yuan, and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In IEEE Infocom, 2006.
-
(2006)
IEEE Infocom
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
15
-
-
85094645639
-
-
Visa Protocols for Controlling Inter-Organization Datagram Flow
-
D. Estrin, J. C. Mogul, G. Tsudik., and K.Anand. Visa Protocols for Controlling Inter-Organization Datagram Flow. IEEE JSAC, 1989.
-
(1989)
IEEE JSAC
-
-
Estrin, D.1
Mogul, J. C.2
Tsudik, G.3
Anand, K.4
-
16
-
-
0003553457
-
Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing
-
RFC 2827, May
-
P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, May 2000.
-
(2000)
-
-
Ferguson, P.1
Senie, D.2
-
18
-
-
33750298863
-
Designing Extensible IP Router Software
-
M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing Extensible IP Router Software. In USENIX NSDI, 2005.
-
(2005)
USENIX NSDI
-
-
Handley, M.1
Kohler, E.2
Ghosh, A.3
Hodson, O.4
Radoslavov, P.5
-
19
-
-
0039178161
-
-
Guidelines for creation, selection, and registration of an Autonomous System (AS)
-
J. Hawkinson and T. Bates. Guidelines for creation, selection, and registration of an Autonomous System (AS). RFC 1930, 1996.
-
(1996)
RFC 1930
-
-
Hawkinson, J.1
Bates, T.2
-
20
-
-
85027203109
-
-
Helion Technology
-
Helion Technology. AES Cores. http://www.heliontech.com/aes. htm, 2008.
-
(2008)
AES Cores
-
-
-
21
-
-
17644411571
-
Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic
-
C. Jin, H. Wang, and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Jin, C.1
Wang, H.2
Shin, K. G.3
-
22
-
-
0040291388
-
The Click Modular Router
-
Aug
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM TOCS, 18(3), Aug. 2000.
-
(2000)
ACM TOCS
, vol.18
, Issue.3
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M. F.5
-
26
-
-
77956538502
-
SAVE: Source Address Validity Enforcement
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement. In IEEE INFOCOM, 2002.
-
(2002)
IEEE INFOCOM
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
27
-
-
65249174426
-
Efficient and Secure Source Authentication with Packet Passports
-
X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In USENIX SRUTI, 2006.
-
(2006)
USENIX SRUTI
-
-
Liu, X.1
Yang, X.2
Wetherall, D.3
Anderson, T.4
-
29
-
-
0003256793
-
-
Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers
-
K. Nichols, S. Blake, F. Baker, and D. Black. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, 1998.
-
(1998)
RFC
, vol.2474
-
-
Nichols, K.1
Blake, S.2
Baker, F.3
Black, D.4
-
31
-
-
0001083965
-
On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
-
32
-
-
0030661010
-
Ticket Based Service Access for the Mobile User
-
B. Patel and J. Crowcroft. Ticket Based Service Access for the Mobile User. In ACM MobiCom, 1997.
-
(1997)
ACM MobiCom
-
-
Patel, B.1
Crowcroft, J.2
-
34
-
-
15744368857
-
Efficient and Secure Source Authentication for Multicast
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar. Efficient and Secure Source Authentication for Multicast. In NDSS, 2001.
-
(2001)
NDSS
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J. D.4
-
35
-
-
33750357978
-
A System for Authenticated Policy-Compliant Routing
-
B. Raghavan and A. C. Snoeren. A System for Authenticated Policy-Compliant Routing. In ACM SIGCOMM, 2004.
-
(2004)
ACM SIGCOMM
-
-
Raghavan, B.1
Snoeren, A. C.2
-
37
-
-
85094668684
-
-
RouteViews Project
-
RouteViews Project. http://www.routeviews.org/.
-
-
-
-
39
-
-
85094654144
-
Anatomy of recent DNS reflector attacks from the victim and reflector points of view
-
June
-
F. Scalzo. Anatomy of recent DNS reflector attacks from the victim and reflector points of view. Nanog37 Presentation, June 2006.
-
(2006)
Nanog37 Presentation
-
-
Scalzo, F.1
-
40
-
-
0001887844
-
Hash-Based IP Traceback
-
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, S. Kent, and W. Strayer. Hash-Based IP Traceback. In ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
41
-
-
0034997397
-
Advance and Authenticated Marking Schemes for IP Traceback
-
D. Song and A. Perrig. Advance and Authenticated Marking Schemes for IP Traceback. In Proc. IEEE Infocom, 2001.
-
(2001)
Proc. IEEE Infocom
-
-
Song, D.1
Perrig, A.2
-
48
-
-
85015385962
-
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
-
A. Yaar, A. Perrig, and D. Song. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE JSAC, 2006.
-
(2006)
IEEE JSAC
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
51
-
-
84872575642
-
An Analysis of BGP Multiple Origin AS (MOAS) Conflicts
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. An Analysis of BGP Multiple Origin AS (MOAS) Conflicts. In ACM IMW, 2001.
-
(2001)
ACM IMW
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S. F.6
Zhang, L.7
|