IP traceback

Results: 42



#Item
211  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
22SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks∗ Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
23A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

A Framework for A Collaborative DDoS Defense George Oikonomou, Jelena Mirkovic University of Delaware oikonomo,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:29:34
24Message Traceback Systems Dancing with the Devil Thesis by  Marios S. Andreou

Message Traceback Systems Dancing with the Devil Thesis by Marios S. Andreou

Add to Reading List

Source URL: mariosandreou.com

Language: English - Date: 2013-03-20 12:55:36
252-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback is a techn

2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback is a techn

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:56
262-5 Efficient Traceback Method for Detecting Illegal Access KAI Toshifumi, NAKATANI Hiroshige, SHIMIZU Hiroshi, SUZUKI Ayako, and TSUKAMOTO Katsuji The amount of damage by illegal access is increasing with the spread of

2-5 Efficient Traceback Method for Detecting Illegal Access KAI Toshifumi, NAKATANI Hiroshige, SHIMIZU Hiroshi, SUZUKI Ayako, and TSUKAMOTO Katsuji The amount of damage by illegal access is increasing with the spread of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:19
273-3 S tudies on Countermeasures for Thwarting Spoofing Attacks — Cases of IP Address Spoofing and Web Spoofing — MIYAMOTO Daisuke, HAZEYAMA Hiroaki, and KADOBAYASHI Youki  This article intends to give case studies f

3-3 S tudies on Countermeasures for Thwarting Spoofing Attacks — Cases of IP Address Spoofing and Web Spoofing — MIYAMOTO Daisuke, HAZEYAMA Hiroaki, and KADOBAYASHI Youki This article intends to give case studies f

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:06:17
283-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2012-03-11 23:15:00
29An Autonomic Approach to Denial of Service Defence∗ Erol Gelenbe, Michael Gellman, and George Loukas Department of Electrical & Electronic Engineering Imperial College, London SW7 2BT {e.gelenbe,m.gellman,georgios.louk

An Autonomic Approach to Denial of Service Defence∗ Erol Gelenbe, Michael Gellman, and George Loukas Department of Electrical & Electronic Engineering Imperial College, London SW7 2BT {e.gelenbe,m.gellman,georgios.louk

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2005-02-14 12:24:51
30This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author’s benefit and for the benefit of the author’s institution, for non-commercial res

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author’s benefit and for the benefit of the author’s institution, for non-commercial res

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2007-01-22 10:42:03