Prevention of Attacks under DDoS Using Target Customer Behavior
暂无分享,去创建一个
[1] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[2] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[3] Robert Beverly,et al. The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet , 2005, SRUTI.
[4] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[5] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[6] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[7] G. W. Stewart. Dns cache poisoning-the next generation , 2003 .
[8] Randall R. Stewart,et al. Improving TCP's Robustness to Blind In-Window Attacks , 2010, RFC.
[9] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[10] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[11] S. Malathi,et al. AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DD OS , 2011 .
[12] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[13] Robert Beverly,et al. The spoofer project: inferring the extent of source address filtering on the internet , 2005 .
[14] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[15] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[16] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[17] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[18] J. Elliott,et al. Distributed denial of service attacks and the zombie ant effect , 2000 .
[19] Fred Baker,et al. Requirements for IP Version 4 Routers , 1995, RFC.