FPGA-Based Multiple DDoS Countermeasure Mechanisms System Using Partial Dynamic Reconfiguration
暂无分享,去创建一个
Nguyen Quoc Tuan | Cuong Pham-Quoc | Tran Ngoc Thinh | Biet Nguyen-Hoang | Thuy-Chau Tran-Thi | Chien Do-Minh | Quoc Nguyen-Bao
[1] Wenke Lee,et al. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[2] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[3] C. Rama Krishna,et al. Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[4] Xia Wang,et al. A scheme of distributed hop-count filtering of traffic , 2009 .
[5] Kang G. Shin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[6] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[7] Wanlei Zhou,et al. Classifying DDoS packets in high-speed networks , 2006 .
[8] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[9] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[10] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[11] Jon Postel,et al. Internet Protocol , 1981, RFC.
[12] KatashitaToshihiro,et al. FPGA-Based Intrusion Detection System for 10 Gigabit Ethernet , 2007 .
[13] Mourad Debbabi,et al. Fingerprinting Internet DNS Amplification DDoS Activities , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[14] Wei Chen,et al. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[15] Jim Tørresen,et al. High Speed Partial Run-Time Reconfiguration Using Enhanced ICAP Hard Macro , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.
[16] Ayman I. Kayssi,et al. IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.