Towards user-centric metrics for denial-of-service measurement
暂无分享,去创建一个
Sonia Fahmy | Jelena Mirkovic | Roshan K. Thomas | Alefiya Hussain | Brett Wilson | Stephen Schwab | Peter L. Reiher | Wei-Min Yao | P. Reiher | S. Fahmy | Alefiya Hussain | J. Mirkovic | Roshan K. Thomas | S. Schwab | Wei-Min Yao | B. Wilson
[1] Mark Claypool,et al. The effect of latency on user performance in Warcraft III , 2003, NetGames '03.
[2] David E. Culler,et al. User-Centric Performance Analysis of Market-Based Cluster Batch Schedulers , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[3] Dongho Kim,et al. Experience with DETER: a testbed for security research , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[4] Scott Shenker,et al. Integrated Services in the Internet Architecture : an Overview Status of this Memo , 1994 .
[5] Alefiya Hussain,et al. Effect of Malicious Traffic on the Network , 2003 .
[6] Jason Nieh,et al. Measuring thin-client performance using slow-motion benchmarking , 2001, TOCS.
[7] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Mina Guirguis,et al. Exploiting the transients of adaptation for RoQ attacks on Internet resources , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[9] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[10] Chun-Ying Huang,et al. Quantifying Skype user satisfaction , 2006, SIGCOMM.
[11] Jelena Mirkovic,et al. A Framework for a Collaborative DDoS Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[12] Ness B. Shroff,et al. Emulation versus simulation: a case study of TCP-targeted denial of service attacks , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[13] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[14] Mark Claypool,et al. The effects of loss and latency on user performance in unreal tournament 2003® , 2004, NetGames '04.
[15] Angelos D. Keromytis,et al. MOVE: An End-to-End Solution to Network Denial of Service , 2005, NDSS.
[16] M. W. Garrett,et al. A service architecture for ATM: from applications to scheduling , 1996, IEEE Netw..
[17] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[18] Kang G. Shin,et al. Persistent dropping: an efficient control of traffic aggregates , 2003, SIGCOMM '03.
[19] Allan Kuchinsky,et al. Quality is in the eye of the beholder: meeting users' requirements for Internet quality of service , 2000, CHI.
[20] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[21] L. R. Yamamoto,et al. Impact of network performance parameters on the end-to-end perceived speech quality , 1997 .
[22] Al Morton,et al. Y.1541-QOSM -- Y.1541 QoS Model for Networks Using Y.1541 QoS Classes , 2005 .
[23] Gerald A. Marin,et al. Modeling networking protocols to test intrusion detection systems , 2004, 29th Annual IEEE International Conference on Local Computer Networks.