Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation
暂无分享,去创建一个
Jun Xu | Jun Li | Minho Sung | Li Li
[1] Brian Krebs,et al. Attack On Internet Called Largest Ever , 2002 .
[2] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[3] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[5] Micah Adler,et al. Trade-offs in probabilistic packet marking for IP traceback , 2005, JACM.
[6] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[7] Michael Weber,et al. Protecting web servers from distributed denial of service attacks , 2001, WWW '01.
[8] Philip N. Klein,et al. Using router stamping to identify the source of IP packets , 2000, CCS.
[9] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[10] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.
[11] Jun Xu,et al. Sustaining Availability of Web Services under Distributed Denial of Service Attacks , 2003, IEEE Trans. Computers.
[12] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[13] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[14] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[15] Yossi Matias,et al. Spectral bloom filters , 2003, SIGMOD '03.
[16] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[17] Michael T. Goodrich,et al. Efficient packet marking for large-scale IP traceback , 2002, CCS '02.
[18] Cheng Jin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[19] Jun Xu,et al. IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks , 2003, IEEE Trans. Parallel Distributed Syst..
[20] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[21] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[22] Jelena Mirkovic,et al. Alliance formation for DDoS defense , 2003, NSPW '03.
[23] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[24] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[25] J. Turner,et al. New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.
[26] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[27] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[28] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[29] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[30] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).
[31] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[32] Ramesh Govindan,et al. COSSACK: Coordinated Suppression of Simultaneous Attacks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[33] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[34] Jun Xu. Sustaining Availability of Web Services under Severe Denial of Service Attacks , 2001 .
[35] Nick G. Duffield,et al. Trajectory sampling for direct traffic observation , 2001, TNET.
[36] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[37] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.