1 |
Haining Wang: DanJu Zhang: Shin, K.G.:, 'SYN-dog: sniffing SYN flooding sources,' Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, 2-5 July 2002 Page(s): 421-428
DOI
|
2 |
Lau, F.; Rubin, S.H.; Smith, M.H.; Trajkovic, L.;, 'Distributed denial of service attacks,' Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Volume: 3, 8-11 Oct. 2000 Page(s): 2275-2280 vol.3
DOI
|
3 |
Schuba, C.L.; Krsul, I.V.; Kuhn, M.G.; Spafford, E.H.; Sundaram, A.; Zamboni, D.;, 'Analysis of a denial of service attack on TCP,' Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, 4-7 May 1997 Page(s): 208-223
DOI
|
4 |
Haining Wang: Danlu Zhang: Kang G. Shin., 'Detecting SYN flooding attacks,' INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Volume: 3, 23-27 June 2002 Page(s): 1530-1539
DOI
|
5 |
Jonathan Lemon;, 'Resisting SYN flood DoS attacks with a SYN cache,' Proceedings of the BSDCon 2002 Conference, Feb 2002
|
6 |
Zin-Won Park; Joon-Hyung Lee; Myung-Kyung Kim;, 'Design of and Extended TCP for preventing DoS Attacks,' Proceedings of 2003KORUS, 2003, Page(s)385-389
DOI
|