On the Feasibility of TTL-Based Filtering for DRDoS Mitigation
暂无分享,去创建一个
Michael Backes | Christian Rossow | Thorsten Holz | Ben Stock | Milivoj Simeonovski | Teemu Rytilahti | C. Rossow | Ben Stock | Thorsten Holz | M. Backes | Milivoj Simeonovski | Teemu Rytilahti
[1] J. Alex Halderman,et al. An Internet-Wide View of Internet-Wide Scanning , 2014, USENIX Security Symposium.
[2] Brice Augustin,et al. Avoiding traceroute anomalies with Paris traceroute , 2006, IMC '06.
[3] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[4] Eric C. Rosen,et al. Multiprotocol Label Switching Architecture , 2001, RFC.
[5] Thomas C. Schmidt,et al. Amplification and DRDoS Attack Defense - A Survey and New Perspectives , 2015, ArXiv.
[6] Lixia Zhang,et al. The (In)Completeness of the Observed Internet AS-level Structure , 2010, IEEE/ACM Transactions on Networking.
[7] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[8] Christian Rossow,et al. Amplification Hell: Revisiting Network Protocols for DDoS Abuse , 2014, NDSS.
[9] Christian Rossow,et al. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks , 2014, USENIX Security Symposium.
[10] Jérome Durand,et al. BGP Operations and Security , 2015, RFC.
[11] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[12] Jon Postel. Character Generator Protocol , 1983, RFC.
[13] Enrico Gregori,et al. On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement , 2012, Internet Measurement Conference.
[14] Thomas E. Anderson,et al. Reverse traceroute , 2010, NSDI.
[15] Geert Deconinck,et al. Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..
[16] Jia Wang,et al. Towards an accurate AS-level traceroute tool , 2003, SIGCOMM '03.
[17] Ayman I. Kayssi,et al. IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[18] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.