DDoS Incidents and their Impact: A Review
暂无分享,去创建一个
[1] Songjie Wei,et al. Benchmarks for DDOS Defense Evaluation , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[2] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[3] R. Hunt,et al. TCP/IP security threats and attack methods , 1999, Comput. Commun..
[4] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[5] Jarmo V. E. Mölsä,et al. Mitigating denial of service attacks in computer networks , 2006 .
[6] Yuebin Bai,et al. Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[7] Jianyi Lin,et al. Computer crime and security survey , 2002 .
[8] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[9] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[10] Los Angeles,et al. D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks , 2003 .
[11] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[12] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[13] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[14] Ramesh Chandra Joshi,et al. Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain , 2007, Third International Symposium on Information Assurance and Security.
[15] I. Monitor. Information Security Management Handbook , 2000 .
[16] R. Mateosian. Firewalls and internet security: Repelling the wily hacker, 2nd ed. [Book Review] , 2003, IEEE Micro.
[17] ChangR. K.C.. Defending against flooding-based distributed denial-of-service attacks , 2002 .
[18] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[19] R. C. Joshi,et al. An Integrated Approach for Defending Against Distributed Denial-of-Service ( DDoS ) Attacks , 2022 .
[20] Challenges and Principles of DDoS Defense paper , 2003 .
[21] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[22] Patrick Horster,et al. Cryptographic Protocols and Network Security , 1992, SEC.
[23] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[24] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[25] Jung-Min Park,et al. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.