참고문헌
- Proc. First DARPA Information Survivability Conference and Exposition Infrastructure for intrusion detection and response SCHNACKENBERG, D;DJAHANDARI,K;STERNE, D.
- IEEE IT Pro. Distributed Denial of Service Attacks and the Zombie Ant Effect Jhon Elliott
- Infrastructure Protection and Emergency Management Symposium The Infrastructure Web: A System for distributed Monitoring And Management George Cybenko;Guofei Jian
- 2000 IEEE A Testbed for Study of Distributed Denial of Service Attacks Andrew Barkley;Steve Liu;Quoc Thong Le Gia;Matt Dingfield;Yashodhan Gokhale
- Tech. Rep. CSD-00-017 A proactive approach to distributed DoS attack prevention using route-based distributed filtering K. Park;H. Lee
- IEEE IT Pro. Defeating Distributed Denial of Service Attacks Xianjun Geng;Andrew B. Whinston
- Proceedings of Sixth Annual International Conference on Mobile Computing and Networking (MobiCom'2000) Intrusion Detection in Wireless AdHoc Networks Yongguang Zhang;Wenke Lee
- Tech. Rep. UCB/CSD-00-1107 Advanced and authenticated marking schemes for IP traceback Dawn Song;Adrian Perrig
- IEEE Distributed Denial of Service Attacks Felix Lau;Ljiljana Trajkovic
- Real Time and Embedded Technology and Applications Symposium Layer-4 service differentiation and resource isolation Haining Wang;Shin, K.G.
- Presented at Information Survivabiloity Workshop The XenoService-A Distributed Defeat for Distributed Denial of Service J. Yan;S. Early;R. Anderson
- Computer magazine Denial-of-Service Attacks Rip the Internet Lee Garber
- IEEE An Achilles' Heel in Signature-Based IDS_Squealing False Positives in SNORT Samuel Patton;William Yurcik;David Doss
- IEEE MULTOPS:a data structure for denial-of-service attack detection Thomer M. Gil
- Recent Advances in Intrusion Detection A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions Wenke Lee;Rahul A. Nimbalkar;Kam K. Yee;Sunil B.Patil;Pragneshkumar H. Desai;Thuan T. Tran;Salvatore J. Stolfo
- IEEE Malicious Packet Dropping:How It Might Impact the TCP Performance and How We Can Detect It Xiaobing Zhang;S. Felix Wu
- Graduate Networking Course, Survey Project Paper Denial of Service Attacks and How to Defend Against Them V. Razmov
- Revised Papers from the 8th International Workshop on Security Protocols DOS-Resistant Authentication with Client Puzzles Tuomas Aura;Pekka Nikander;Jussipekka Leiwo
- IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS-PART A:SYSTEMS AND HUMANS v.31 On the Defense of the Distributed Denial of Service Attacks:An OnOff Feedback Control Approach Yong Xiong;Steve Liu;Peter Sun
- Computers and Communications;Proceedings. Sixth IEEE Symposium on ACtive edge-Tagging(ACT):An Intruder Indentification & Isolation Scheme in Active Networks Kim, G.;Bogovic, T.;Chee, D.
- SIGCOMM On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park;Heejo Lee
- Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID) Autonomic Response to Distributed Denial of Service Attacks D. Sterne(et al.)
- Proceedings of the 3rd IFIP International Working Conference on Active Networks(IWAN) Practical network applications on a lightweight active management environment K. G. Anagnostakis;S. Ioannidis;S. Miltchev;J.M. Smith
- Trends in denial of service attack technology C. C. Center
- ICICS Quantifying Network Denial of Service:A Location Service Case Stydy Y. Chen;A. Bargreil;R. Katz;J. Kubiatowicz
- IEEE Detecting Distributed Denial-of-Service Attacks Using Komogorov Complexity Metrics A.B. Kulkarmi;S.F.Bush;S.C.Evans
- IEEE On Design and Evaluation of Intention-Driven ICMP Traceback Allison Mankin;Dan Massey;Chien-Lung Wu;S. Felix Wu;Lixia Zhang
- IEEE Computer Security Applications Conference Requirements for a General Framework for Response to DDoS D.W. Gresty;Q. Shi;M. Merabti
- ACM Protecting Web Servers from Distributed Denial of Service Attacks Frank Karg;Joern Maier;Michael Weber
- IEEE SPECTRUM No Longer in Denial Xiaobing Zhang;S. Felix Wu
- IEEE DARPA Information Assurance Progra Experimental Confirmation DdoS Sara Kaufman;Stephe Ying
- DARPA Information Survivability Conference & Exposition II. 2001. DISCEX '01. Proceedings v.1 no.Iss. Cooperative Intrusion Traceback and Response Architecture (CITRA) Schnackengerg, D.;Djahandari, K.
- Aerospace of Conference, 2001, IEEE Proceeding Using Active Networking to Thwart Distributed Denial of Service Attacks Scott Shyne;Adam Hovak;Joseph Riolo
- ACM Computer Communications Review An Analysis of Using Reflectors in Distributed Denial-of-Service Attacks Vern Paxson
- Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables-A Feasibility Study Joao B. D. Cabreraa;Lundy Lewisb;Xinzhou Qinc(et al.)
- Info-tech and Info-net.2001. Proceedings. ICII 2001- Beijing. 2001 International Conferences The diagnosis of DDoS attack and a novel approach to optimizing control Zhao Wen-Wang;Qin Shi-Yin
- TCSET Denial of service and distributed denial of service attacks Andrian Piskozub
- Proceedings, DANCE 02', 2002 IEEE Active Network Based DDoS Defense Dan Sterne;Kelly Djahandari;Ravindra Balupari;William La Cholter;Bill Babson;Brett Wilson;Priya Narasimhan;Andrew Purtell;Dan Schnackenberg;Scott Linden
- Applications and the Internet (SAINT) Workshops, 2002. Proceedings. 2002 Symposium on Security Issues for Internet Appliances Stajano, F.;Isozaki, H.
- Network and Distributed System Security Symposium Implementing Pushback: Router-Based Defense Against DDoS Attacks John Ioannidis;Steven M. Bellovin
- INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. v.3 SAVE: Source Address Validity Enforcement Protocol Jun Li;Mirkovic, J.;Mengqiu Wang;Reiher, P.;Lixia Zhang
- ACM Computer Communication Review v.32 no.3 Controlling high bandwidth aggregates in the network Ratul Manajan;Steven M. Bellovin;Sally Floyd;John Ioannidis;Vern Paxson;Scott Shenker
- 10th IEEE International Conference Engineering of a global defense infrastructure for DDoS attacks Wan, K.K.K.;Chang. R.K.C.
- Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002. MASCOTS 2002. Proceedings. 10th IEEE International Symposium on You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law;John C.S. Lui;David K.Y. Yau
- 10th IEEE International Conference on Network Protocols(ICNP) IP Traceback-based Intelligent Packet Filtering:A Novel Technique for Defending Against Internet DDoS Attacks Minho Sung;Jun Xu
- Parallel and Distributed Processing Symposium., Proceedings International, IPDPS Defending against distributed denial of service attacks using resistant mobile agent architecture Tieyan Li;Wai-Meng Chew;Kwok-Yan Lam
- IEEE SPECTRUM An Active Security Protocol against DoS attacks Xiobing Zhang;S. Felix Wu
- IEEE Active Shaping:A Countermeasure against DDoS attack Dai kashiwa;Eric Y. Chen;Hitoshi Fuji
- Quality of Service, 2002 Tenth IEEE International Workshop Defending Against Distributed Denial of Service Attacks with Max-Min Fair Server-centric Router Throttles David K. Y. Y. Yau;John C. S. Lui;Feng Liang
- Proceedings of Annual Computer Security Applications of Conference (ACSAC) Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing David Mankins;Rajesh Krishnan;Ceilyn Boyd;John Zaho;Michael Frentz
- 2002. Tenth IEEE International Workshop on Mitigation of DoS attacks through QoS regulation, Quality of Service Garg, A.;Narasimha Reddy;A.L.
- ACM A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic;Peter Reiher
- Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP'02), 2002 IEEE Attacking DDoS at the source Jelena Mirkovic;Gregory Prier;Peter Reiher
- Decision and Control, 2002, Proceedings of the 41st IEEE Conference on v.2 Using Transient Behavior of TCP in Mitigation of Distributed Denial of Service Attacks M. Kalantari;K. Gallicchio;M.A. Shayman
- IEEE Honeypots for Distributed Denial of Service Attacks NathalieWeiler
- IEEE Defending against flooding-based distributed denial-of-service attacks Rocky K.C. Chang r.
- Proceedings of the 25th Annual International Computer Software and Applications Conference (COMPSAC.01) 2002 IEEE Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures Stamatis Karnouskos
- ACM Workshop on Privacy in the Electronic Society Defending Against an Internet-based Attack on the Physical World Simon Byers;Aviel D. Rubin;David Kormann
- Computers, IEEE Transactions on v.52 no.Issue:2 Sustaining availability of web services under distributed denial of service attacks Jun Xu;Wooyong Lee
- Communications, 2003. ICC '03. IEEE International conference on v.1 Protection from distributed denial of service attacks using history-based ip filtering Tao Peng;Leckie, C.;Ramamohanarao, K.
- DARPA Information Survivabiliity Conference and Exposition (DISCEX'03), IEEE Analyzing interaction between distributed denial of service attacks and mitigation technologies W. J. Blackert;D. M. Gregg;A. K. Castner;E.M.Kyle;R.L.Hom;R.M.Jokerst
- Security and Privacy, 2003. Proceedings. 2003 Symposium on Defending against denial-of-service attacks with puzzle auctions XiaoFeng Wang;Reter, M.K.
- Security and Privacy, 2003. Proceedings. 2003 Symposium on Pi: a path identification mechanism to defend against DDoS attacks Yaar, A.;Perrig, A.;Song, D.
- Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks A game based analysis of the client puzzle approach to defend against DoS attacks B. Bencsath;L. Buttyan;I. Vajda