-
2
-
-
85094666870
-
-
May 9 2007
-
Microsoft's unabated patch flow. http://www.avertlabs.com/research/blog/index.php/category/ security-bulletins/, May 9 2007.
-
Microsoft's unabated patch flow
-
-
-
3
-
-
84869648628
-
-
March
-
'Surge' in hijacked PC networks. http://news.bbc.co.uk/2/hi/technology/6465833.stm, March 2007.
-
(2007)
Surge' in hijacked PC networks
-
-
-
4
-
-
25744465894
-
-
Technical report, UC Berkeley
-
D. Adkins, K. Lakshminarayanan, A. Perrig, and I. Stoica. Towards a more functional and secure network infrastructure. Technical report, UC Berkeley, 2003.
-
(2003)
Towards a more functional and secure network infrastructure
-
-
Adkins, D.1
Lakshminarayanan, K.2
Perrig, A.3
Stoica, I.4
-
5
-
-
35048820228
-
Mayday: Distributed filtering for internet services
-
D. G. Andersen. Mayday: Distributed filtering for internet services. In USITS, 2003.
-
(2003)
USITS
-
-
Andersen, D. G.1
-
7
-
-
3543121457
-
Preventing internet denial-of-service with capabilities
-
T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-of-service with capabilities. In HotNets-II, 2003.
-
(2003)
HotNets-II
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
8
-
-
34250668440
-
Network capabilities: The good, the bad and the ugly
-
K. Argyraki and D. Cheriton. Network capabilities: The good, the bad and the ugly. In HotNets-IV, 2005.
-
(2005)
HotNets-IV
-
-
Argyraki, K.1
Cheriton, D.2
-
9
-
-
85094650994
-
Real-time response to denial-of-service attacks
-
K. Argyraki and D. R. Cheriton. Real-time response to denial-of-service attacks. In USENIX, 2005.
-
(2005)
USENIX
-
-
Argyraki, K.1
Cheriton, D. R.2
-
10
-
-
84891624492
-
Off by default!
-
H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker. Off by default! In HotNets-IV, 2005.
-
(2005)
HotNets-IV
-
-
Ballani, H.1
Chawathe, Y.2
Ratnasamy, S.3
Roscoe, T.4
Shenker, S.5
-
12
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B. H.1
-
13
-
-
34250640971
-
Flow-cookies: Using bandwidth amplification to defend against DDoS flooding attacks
-
M. Casado, P. Cao, A. Akella, and N. Provos. Flow-cookies: Using bandwidth amplification to defend against DDoS flooding attacks. In IWQoS, 2006.
-
(2006)
IWQoS
-
-
Casado, M.1
Cao, P.2
Akella, A.3
Provos, N.4
-
14
-
-
2442593059
-
Serving DNS using a peer-to-peer lookup service
-
R. Cox, A. Muthitacharoen, and R. Morris. Serving DNS using a peer-to-peer lookup service. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Cox, R.1
Muthitacharoen, A.2
Morris, R.3
-
15
-
-
85094675346
-
The sybil attack
-
J. R. Douceur. The sybil attack. In IPTPS, 2001.
-
(2001)
IPTPS
-
-
Douceur, J. R.1
-
17
-
-
77952415099
-
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In CCS, 2007.
-
(2007)
CCS
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
21
-
-
8344224137
-
Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants
-
A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants. In SIGCOMM, 2003.
-
(2003)
SIGCOMM
-
-
Kuzmanovic, A.1
Knightly, E.2
-
22
-
-
84872956076
-
iPlane: An information plane for distributed services
-
H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An information plane for distributed services. In OSDI, 2006.
-
(2006)
OSDI
-
-
Madhyastha, H. V.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.5
Krishnamurthy, A.6
Venkataramani, A.7
-
23
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. CCR, 2002.
-
(2002)
CCR
-
-
Mahajan, R.1
Bellovin, S. M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
24
-
-
51349153757
-
dFence: Transparent Network-based Denial of Service Mitigation
-
A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang. dFence: Transparent Network-based Denial of Service Mitigation. In NSDI, 2007.
-
(2007)
NSDI
-
-
Mahimkar, A.1
Dange, J.2
Shmatikov, V.3
Vin, H.4
Zhang, Y.5
-
26
-
-
36949036429
-
Portcullis: Protecting connection setup from Denial-of-Capbility attacks
-
B. Parno, D. Wendlant, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting connection setup from Denial-of-Capbility attacks. In SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Parno, B.1
Wendlant, D.2
Shi, E.3
Perrig, A.4
Maggs, B.5
Hu, Y.-C.6
-
28
-
-
24044433162
-
The design and implementation of a next generation name service for the internet
-
V. Ramasubramanian and E. G. Sirer. The design and implementation of a next generation name service for the internet. In SIGCOMM, 2004.
-
(2004)
SIGCOMM
-
-
Ramasubramanian, V.1
Sirer, E. G.2
-
30
-
-
65249174985
-
-
Technical report, Carnegie Mellon University
-
E. Shi, I. Stoica, D. Andersen, and A. Perrig. OverDoSe: A generic DDoS protection service using an overlay network. Technical report, Carnegie Mellon University, 2006.
-
(2006)
OverDoSe: A generic DDoS protection service using an overlay network
-
-
Shi, E.1
Stoica, I.2
Andersen, D.3
Perrig, A.4
-
33
-
-
33745781163
-
Countering DoS attacks with stateless multipath overlays
-
A. Stavrou and A. D. Keromytis. Countering DoS attacks with stateless multipath overlays. In CCS, 2005.
-
(2005)
CCS
-
-
Stavrou, A.1
Keromytis, A. D.2
-
34
-
-
0038322587
-
Internet indirection infrastructure
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In SIGCOMM, 2002.
-
(2002)
SIGCOMM
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
35
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
R. Stone. CenterTrack: An IP Overlay Network for Tracking DoS Floods. In USENIX Security, 2000.
-
(2000)
USENIX Security
-
-
Stone, R.1
-
36
-
-
0036367741
-
Overlook: Scalable name service on an overlay network
-
M. Theimer and M. B. Jones. Overlook: Scalable name service on an overlay network. In ICDCS, 2002.
-
(2002)
ICDCS
-
-
Theimer, M.1
Jones, M. B.2
-
37
-
-
47749130236
-
DDoS defense by offense
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS defense by offense. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
|