A Study on Amplification DRDoS Attacks and Defenses
暂无分享,去创建一个
[1] Damon McCoy,et al. Understanding the Emerging Threat of DDoS-as-a-Service , 2013, LEET.
[2] Christian Rossow,et al. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks , 2014, WOOT.
[3] Vyas Sekar,et al. LADS: Large-scale Automated DDoS Detection System , 2006, USENIX Annual Technical Conference, General Track.
[4] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[5] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[6] Christian Rossow,et al. Amplification Hell: Revisiting Network Protocols for DDoS Abuse , 2014, NDSS.
[7] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] Steven M. Bellovin,et al. Implementing Pushback: Router-Based Defense Against DDoS Attacks , 2002, NDSS.
[9] Christian Rossow,et al. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks , 2014, USENIX Security Symposium.
[10] Natalija Vlajic,et al. Dirt Jumper: A key player in today's botnet-for-DDoS market , 2012, World Congress on Internet Security (WorldCIS-2012).
[11] Amir Herzberg,et al. LOT: A Defense Against IP Spoofing and Flooding Attacks , 2012, TSEC.
[12] Wu-chi Feng,et al. Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.