New Mitigating Technique to Overcome DDOS Attack
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[2] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[3] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[4] Pekka Nikander,et al. Towards Network Denial of Service Resistant Protocols , 2000, SEC.
[5] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[6] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[7] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[8] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[9] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[10] Ari Juels,et al. Client puzzles: A cryptographic defense against connection depletion , 1999 .
[11] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[12] Kotagiri Ramamohanarao,et al. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.
[13] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[14] Craig Partridge,et al. Hardware support for a hash-based IP traceback , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[16] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[18] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[19] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[20] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[21] Bill Cheswick,et al. Mapping and Visualizing the Internet , 2000, USENIX Annual Technical Conference, General Track.
[22] Wu-chang Feng,et al. The case for TCP/IP puzzles , 2003, FDNA '03.
[23] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[24] Jun Xu,et al. IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[25] Shiuh-Pyng Shieh,et al. Defending against spoofed DDoS attacks with path fingerprint , 2005, Comput. Secur..
[26] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[27] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[28] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[29] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[30] Kotagiri Ramamohanarao,et al. Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[31] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[32] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.