Hybrid Approach for IP Traceback Analysis in Wireless Networks
暂无分享,去创建一个
[1] Jaydip Sen,et al. A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers , 2011, ArXiv.
[2] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[3] Jennifer S. Raj,et al. Secured Self Organizing Network Architecture in Wireless Personal Networks , 2017, Wirel. Pers. Commun..
[4] M. I. Fanany,et al. A SPARSE ENCODING SYMMETRIC MACHINES PRE-TRAINING FOR TEMPORAL DEEP BELIEF NETWORKS FOR MOTION ANALYSIS AND SYNTHESIS , 2015 .
[5] Dinesh C. Verma,et al. Policy-based management of content distribution networks , 2002, IEEE Netw..
[6] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[7] Robert H. Deng,et al. Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks , 2015, IEEE Transactions on Information Forensics and Security.
[8] S. Smys,et al. Construction of virtual backbone to support mobility in MANET — A less overhead approach , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[9] Eric Tutu Tchao,et al. On Distributed Denial of Service Current Defense Schemes , 2019, Technologies.
[10] Indraneel Sreeram,et al. HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.
[11] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[12] Vern Paxson,et al. End-to-end routing behavior in the Internet , 1996, TNET.
[13] Craig Partridge,et al. Hardware support for a hash-based IP traceback , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[14] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[15] Shigeyuki Matsuda,et al. Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..
[16] B. Chakrabarti,et al. Quantum Annealing and Related Optimization Methods , 2008 .
[17] Colin Boyd,et al. Fair Client Puzzles from the Bitcoin Blockchain , 2016, ACISP.
[18] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[19] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[20] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[21] Kotagiri Ramamohanarao,et al. Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[22] Bikas K. Chakrabarti,et al. Quantum Annealing and Other Optimization Methods , 2005 .
[23] Jaydip Sen,et al. Security and Privacy Issues in Wireless Mesh Networks: A Survey , 2013, Wireless Networks and Security.
[24] S. Smys,et al. A hybrid multilevel authentication scheme for private cloud environment , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[25] Shivendu Mishra,et al. Strong Password Based EAP-TLS Authentication Protocol for WiMAX , 2010 .
[26] Michael T. Goodrich,et al. Efficient packet marking for large-scale IP traceback , 2002, CCS '02.
[27] Nirwan Ansari,et al. Accommodating fragmentation in deterministic packet marking for IP traceback , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[28] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[29] S. Smys,et al. Efficient cryptographic approach for data security in wireless sensor networks using MES V-U , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[30] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[31] Ajith Abraham,et al. Computational Social Networks: Security and Privacy , 2012 .
[32] Ayako Suzuki,et al. Mathematical Models of IP Traceback Methods and Their Verification , 2005, SEC.
[33] Saiful Adli Ismail,et al. Review of Recent Detection Methods for HTTP DDoS Attack , 2019, J. Comput. Networks Commun..
[34] A. Praveena,et al. Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .
[35] Ashok Singh Sairam,et al. ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters , 2014, Comput. Commun..