Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection
暂无分享,去创建一个
Yuan Tian | Xiao Wang | Patrick Tague | Yu Seung Kim | Arjun P. Athreya | A. Athreya | Xiao Wang | Yuan Tian | P. Tague | Yu Seung Kim
[1] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[4] Jeff Ahrenholz. Comparison of CORE network emulation platforms , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[5] Stephen Northcutt. Network Intrusion Detection: An Analyst's Hand-book , 2000 .
[6] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[7] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[8] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[9] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[10] Jeffrey Barrett. Using Software to Create a Risk-Based Annual Internal Audit Plan , 1999 .
[11] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[12] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[13] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[15] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[16] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.