Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
暂无分享,去创建一个
David K. Y. Yau | Yeung Yam | John C. S. Lui | Feng Liang | John C.S. Lui | Y. Yam | D. Yau | Feng Liang
[1] Abhay Parekh,et al. A generalized processor sharing approach to flow control in integrated services networks-the single node case , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[2] Abhay Parekh,et al. A generalized processor sharing approach to flow control in integrated services networks: the single-node case , 1993, TNET.
[3] Baruch Awerbuch,et al. Converging to approximated max-min flow fairness in logarithmic time , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[4] Marco de Vivo,et al. Internet security attacks at the basic levels , 1998, OPSR.
[5] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[6] Larry Peterson,et al. Inter-AS traffic patterns and their implications , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[7] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[8] Xuxian Jiang,et al. Application Performance on the CROSS/ Linux Software Programmable Router , 2001 .
[9] David K. Y. Yau,et al. Resource management in software-programmable router operating systems , 2001, IEEE J. Sel. Areas Commun..
[10] David K. Y. Yau,et al. On Defending Against Distribtued Denial- of-Service Attacks with Server-Centric Router Throttles , 2001 .
[11] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[12] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[13] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[14] Chin-Tser Huang,et al. Hop integrity in computer networks , 2002, TNET.
[15] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[16] A. L. Narasimha Reddy,et al. Mitigation of DoS attacks through QoS regulation , 2004, Microprocess. Microsystems.
[17] David K. Y. Yau,et al. Quality of service provisioning for composable routing elements , 2006, Comput. Networks.
[18] Desmond P. Taylor,et al. A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The SingleNode Case , 2007 .