D-WARD: a source-end defense against flooding denial-of-service attacks
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. Defending against Sequence Number Attacks , 2012, RFC.
[2] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[3] Larry L. Peterson,et al. Defending against denial of service attacks in Scout , 1999, OSDI '99.
[4] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[5] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.
[6] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[7] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Hong Zhu,et al. NetBouncer: client-legitimacy-based high-performance DDoS filtering , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[9] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[10] Mario Gerla,et al. D-ward: source-end defense against distributed denial-of-service attacks , 2003 .
[11] Dan Schnackenberg,et al. Infrastructure for intrusion detection and response , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[13] Ari Juels,et al. $evwu Dfw , 1998 .
[14] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[15] Ramesh Govindan,et al. COSSACK: Coordinated Suppression of Simultaneous Attacks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[16] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[17] Jelena Mirkovic,et al. Alliance formation for DDoS defense , 2003, NSPW '03.
[18] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[19] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[20] Kotagiri Ramamohanarao,et al. Defending Against Distributed Denial of Service Attacks Using Selective Pushback , 2002 .
[21] Los Angeles,et al. D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks , 2003 .
[22] Van Jacobson,et al. Congestion avoidance and control , 1988, SIGCOMM '88.
[23] Domenico Cotroneo,et al. Programming routers to improve network secu-rity , 2001 .
[24] A. L. Narasimha Reddy,et al. Mitigation of DoS attacks through QoS regulation , 2004, Microprocess. Microsystems.
[25] Yuliang Zheng,et al. A Method to Implement a Denial of Service Protection Base , 1997, ACISP.
[26] Jelena Mirkovic,et al. Source-end DDoS defense , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[27] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.