A new perspective in defending against DDoS
暂无分享,去创建一个
[1] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[2] Lixia Zhang. VirtualClock: A New Traffic Control Algorithm for Packet-Switched Networks , 1991, ACM Trans. Comput. Syst..
[3] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[4] Shigang Chen,et al. Network management based on policies , 2000 .
[5] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[6] Kang G. Shin,et al. SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[7] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[8] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.
[9] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[10] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[11] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.