Denial of Service Attacks
暂无分享,去创建一个
[1] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[2] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[3] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[4] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Michael Walfish,et al. DDoS defense by offense , 2006, TOCS.
[7] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[8] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[9] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[10] Adrian Perrig,et al. TESLA Broadcast Authentication , 2003 .
[11] Angelos D. Keromytis,et al. SOS: an architecture for mitigating DDoS attacks , 2004, IEEE Journal on Selected Areas in Communications.
[12] Yuting Zhang,et al. Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[14] Hong Zhu,et al. NetBouncer: client-legitimacy-based high-performance DDoS filtering , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[15] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[16] Hassan Aljifri,et al. IP Traceback using header compression , 2003, Comput. Secur..
[17] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[18] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[19] Michael K. Reiter,et al. Mitigating bandwidth-exhaustion attacks using congestion puzzles , 2004, CCS '04.
[20] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[21] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[22] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[23] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[24] Dawn Xiaodong Song,et al. FIT: fast Internet traceback , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[26] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[27] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[28] George Kesidis,et al. A preliminary simulation of the effect of scanning worm activity on multicast , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[29] Jelena Mirkovic,et al. Alliance formation for DDoS defense , 2003, NSPW '03.
[30] Vern Paxson,et al. End-to-end routing behavior in the Internet , 1996, TNET.
[31] V. Paxson. End-to-end routing behavior in the internet , 2006, CCRV.
[32] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[33] Bill Cheswick,et al. Mapping and Visualizing the Internet , 2000, USENIX Annual Technical Conference, General Track.
[34] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[35] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[36] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[37] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[38] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[39] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[40] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[41] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[42] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[43] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[44] Kefei Chen,et al. Improvements on the WTLS protocol to avoid denial of service attacks , 2005, Comput. Secur..
[45] David R. Cheriton,et al. Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.
[46] Catherine Rosenberg,et al. Evaluation methods for internet security technology , 2004 .
[47] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[48] Mark Handley,et al. Internet Denial-of-Service Considerations , 2006, RFC.
[49] C.-H. Chu,et al. Tactical bandwidth exhaustion in ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[50] Alex C. Snoeren,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[51] Qijun Gu,et al. Defending against packet injection attacks unreliable ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[52] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[53] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[54] Michael Walfish,et al. DDoS defense by offense , 2006, SIGCOMM 2006.
[55] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[56] David Moore,et al. Beyond folklore: observations on fragmented traffic , 2002, TNET.
[57] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[58] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[59] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.