Quantifying the reflective DDoS attack capability of household IoT devices
暂无分享,去创建一个
Vijay Sivaraman | Minzhao Lyu | Arunan Sivanathan | Hassan Habibi Gharakheili | Adam Radford | Daniel Sherratt | V. Sivaraman | A. Radford | H. Gharakheili | Minzhao Lyu | Arunan Sivanathan | Daniel Sherratt
[1] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[2] Christian Rossow,et al. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks , 2014, USENIX Security Symposium.
[3] Deian Stefan,et al. The Most Dangerous Code in the Browser , 2015, HotOS.
[4] Roksana Boreli,et al. Smart-Phones Attacking Smart-Homes , 2016, WISEC.
[5] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[6] Christian Rossow,et al. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks , 2014, WOOT.
[7] S. M. García,et al. 2014: , 2020, A Party for Lazarus.
[8] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[9] Eliot Lear. Manufacturer Usage Description Framework , 2016 .
[10] Florence March,et al. 2016 , 2016, Affair of the Heart.
[11] Christian Rossow,et al. Amplification Hell: Revisiting Network Protocols for DDoS Abuse , 2014, NDSS.