A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
暂无分享,去创建一个
[1] Kathleen M. Carley,et al. Characterization of defense mechanisms against distributed denial of service attacks , 2004, Comput. Secur..
[2] Vrizlynn L. L. Thing,et al. ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback , 2003, ICICS.
[3] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[4] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Steffen Rothkugel,et al. Enhancing the Web's Infrastructure: From Caching to Replication , 1997, IEEE Internet Comput..
[6] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[7] Diane Davidowicz,et al. Domain Name System (DNS) Security , 1999 .
[8] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[9] Mun Choon Chan,et al. Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.
[10] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[11] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[12] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[13] K. K. Ramakrishnan,et al. Congestion control in resilient packet rings , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[14] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).
[15] Sally Floyd,et al. Pushback Messages for Controlling Aggregates in the Network , 2001 .
[16] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[17] Xiapu Luo,et al. On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.
[18] Ruby B. Lee,et al. Remote Denial of Service Attacks and Countermeasures , 2001 .
[19] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[20] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[21] Jelena Mirkovic,et al. Source-end DDoS defense , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[22] Gábor Fehér,et al. Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks , 2005 .
[23] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[24] Lucas Ballard,et al. An extensible platform for evaluating security protocols , 2005, 38th Annual Simulation Symposium.