MOTAG: Moving Target Defense against Internet Denial of Service Attacks
暂无分享,去创建一个
Angelos Stavrou | Kun Sun | Quan Jia | A. Stavrou | Kun Sun | Quan Jia
[1] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[2] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[3] N. L. Johnson,et al. Urn models and their application : an approach to modern discrete probability theory , 1978 .
[4] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[5] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[6] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[8] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[9] Samuel Kotz,et al. Urn Models and Their Applications: An Approach to Modern Discrete Probability Theory , 1978, The Mathematical Gazette.
[10] Elaine Shi,et al. Portcullis: protecting connection setup from denial-of-capability attacks , 2007, SIGCOMM '07.
[11] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[12] Jesús A. De Loera,et al. Integer Polynomial Optimization in Fixed Dimension , 2006, Math. Oper. Res..
[13] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Daniel Massey,et al. Epiphany: A location hiding architecture for protecting critical services from DDoS attacks , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[15] Angelos D. Keromytis,et al. Countering DoS attacks with stateless multipath overlays , 2005, CCS '05.
[16] Xin Liu,et al. NetFence: preventing internet denial of service from inside out , 2010, SIGCOMM '10.
[17] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[18] Xiaoling Sun,et al. Nonlinear Integer Programming , 2006 .
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[21] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[22] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[23] Michael K. Reiter,et al. WRAPS: Denial-of-Service Defense through Web Referrals , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).
[24] Vitaly Shmatikov,et al. dFence: Transparent Network-based Denial of Service Mitigation , 2007, NSDI.
[25] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[26] Brent Waters,et al. New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.
[27] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2005, WORM '05.
[28] Thomas E. Anderson,et al. Phalanx: Withstanding Multimillion-Node Botnets , 2008, NSDI.
[29] Xiaowei Yang,et al. TVA: A DoS-Limiting Network Architecture , 2008, IEEE/ACM Transactions on Networking.