A Middleware System for Protecting Against Application Level Denial of Service Attacks
暂无分享,去创建一个
Mudhakar Srivatsa | Ling Liu | Jian Yin | Arun Iyengar | Ling Liu | M. Srivatsa | A. Iyengar | Jian Yin
[1] Michael K. Reiter,et al. Mitigating bandwidth-exhaustion attacks using congestion puzzles , 2004, CCS '04.
[2] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[3] Amin Vahdat,et al. Multimedia Web services for mobile clients using quality aware transcoding , 1999, WOWMOM '99.
[4] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[5] Eric A. Brewer,et al. Cluster-based scalable network services , 1997, SOSP.
[6] Paul Francis,et al. The IP Network Address Translator (NAT) , 1994, RFC.
[7] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[8] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[9] Scott Shenker,et al. Core-stateless fair queueing: a scalable architecture to approximate fair bandwidth allocations in high-speed networks , 2003, TNET.
[10] Ari Juels,et al. Client puzzles: A cryptographic defense against connection depletion , 1999 .
[11] Arun Iyengar,et al. A Tiered System for Serving Differentiated Content , 2004, World Wide Web.
[12] Scott Shenker,et al. Core-stateless fair queueing: achieving approximately fair bandwidth allocations in high speed networks , 1998, SIGCOMM '98.
[13] Amin Vahdat,et al. Application-level differentiated multimedia Web services using quality aware transcoding , 2000, IEEE Journal on Selected Areas in Communications.
[14] Jianliang Xu,et al. Web content delivery , 2005 .
[15] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[16] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[17] Hector Garcia-Molina,et al. Improving search in peer-to-peer networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[18] Lakshmish Ramaswamy,et al. Techniques for Efficiently Serving and Caching Dynamic Web Content , 2005 .
[19] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[20] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[21] Ludmila Cherkasova,et al. Session-Based Admission Control: A Mechanism for Peak Load Management of Commercial Web Sites , 2002, IEEE Trans. Computers.
[22] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[23] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.
[24] Michele Colajanni,et al. Enhancing a web-server cluster with quality of service mechanisms , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).
[25] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[26] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[27] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[28] Brent Waters,et al. New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.