Catch Me If You Can: A Cloud-Enabled DDoS Defense
暂无分享,去创建一个
Fei Li | Angelos Stavrou | Daniel Fleck | Huangxin Wang | Quan Jia | Walter Powell | A. Stavrou | Fei Li | D. Fleck | Walter Powell | Huangxin Wang | Quan Jia
[1] Thomas E. Anderson,et al. Phalanx: Withstanding Multimillion-Node Botnets , 2008, NSDI.
[2] Thomas P. Brisco. DNS Support for Load Balancing , 1995, RFC.
[3] Peter Membrey,et al. DNS Load Balancing , 2012 .
[4] Vitaly Shmatikov,et al. dFence: Transparent Network-based Denial of Service Mitigation , 2007, NSDI.
[5] Xin Liu,et al. To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.
[6] K. Srinivas,et al. Preventing Internet Denial-Of-Service with Capabilities , 2013 .
[7] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[8] Angelos D. Keromytis,et al. MOVE: An End-to-End Solution to Network Denial of Service , 2005, NDSS.
[9] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[10] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[11] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[12] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[13] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.0 , 1996, RFC.
[14] Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[15] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[16] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[17] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[18] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.
[19] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[20] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[21] Alexey Melnikov,et al. The WebSocket Protocol , 2011, RFC.
[22] Xin Liu,et al. NetFence: preventing internet denial of service from inside out , 2010, SIGCOMM '10.
[23] David G. Andersen. Mayday: Distributed Filtering for Internet Services , 2003, USENIX Symposium on Internet Technologies and Systems.
[24] David Wetherall,et al. TVA: a DoS-limiting network architecture , 2008, TNET.