THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 62 |
Dung lượng | 1,67 MB |
Nội dung
Ngày đăng: 25/03/2015, 11:18
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
[32] F. Wu-Chang, D. D. Kandlur, D. Saha, and K. G. Shin, “Stochastic fair blue: a queue management algorithm for enforcing fairness,” in IEEE INFOCOM, 2001 | Sách, tạp chí |
|
||
[36] “Wfq implementation code donated by Paolo Losi,” http://www.isi.edu/nsnam/archive/ns-users/webarch/2000/msg04025.html | Sách, tạp chí |
|
||
[37] C. Zhang, J. Yin, Z. Cai, and W. Chen, “RRED: Robust RED Algorithm to Counter Low-Rate Denial-of-Service Attacks”, in IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 5, MAY 2010 | Sách, tạp chí |
|
||
[33] Arbor Networks: Worldwide Infrastructure Security Report 2012 Volume VIII http://pages.arbornetworks.com/rs/arbor/images/WISR2012_EN.pdf | Link | |||
[34] RFC 6298 - 2. The Basic Algorithm, (2.4) http://tools.ietf.org/html/rfc6298 | Link | |||
[1] Arbor Networks: Worldwide ISP Security Report, September 2005, <http://www.arbor.net/downloads/Arbor_Worldwide_ISP_Security_Report.pdf> | Khác | |||
[2] A. Kuzmanovic, E.W. Knightly, Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants, in: SIGCOMM, 2003, pp. 75–86 | Khác | |||
[3] A. Kuzmanovic, E.W. Knightly, Low-rate TCP-targeted denial of service attacks and counter strategies, IEEE/ACM Transactions on Networking (TON) Volume 14 Issue 4, August 2006, 683 – 696 | Khác | |||
[4] R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, S. Shenker, Controlling high bandwidth aggregates in the network, Computer Communication Review 32 (3) (2002) 62–73 | Khác | |||
[5] J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDOS attacks, in: NDSS, 2002 | Khác | |||
[6] J. Mirkovic, G. Prier, P.L. Reiher, Attacking DDOS at the Source, in: ICNP, 2002, pp. 312–321 | Khác | |||
[7] T.M. Gil, M. Poletter, MULTOPS: a data-structure for bandwidth attack detection, in: Proceedings of USENIX Security Symposium 2001, Washington, DC, August 2001 | Khác | |||
[8] H. Wang, K.G. Shin, Transport-aware IP routers: a built-in protection mechanism to counter DDOS attacks, IEEE Transactions on Parallel and Distributed Systems 14 (9) (2003) 873–884 | Khác | |||
[9] R. Thomas, B. Mark, T. Johnson, J. Croall, NetBouncer: client- legitimacy-based high-performance DDOS filtering, in: DISCEX, 2003, pp. 14–25t | Khác | |||
[10] A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, Y. Zhang, dFence: transparent network-based denial of service mitigation, in: Fourth USENIX NSDI, Cambridge, MA, April 2007 | Khác | |||
[11] A. Bremler-Barr, N. Halachmi, H. Levi, Aggressiveness Protective Fair Queueing for Bursty Applications, in: IWQoS, 2006 | Khác | |||
[12] X. Yang, D. Wetherall, T.E. Anderson, A DOS-limiting network architecture, in: SIGCOMM, 2005, pp. 241–252 | Khác | |||
[13] A. Yaar, A. Perrig, D.X. Song, SIFF: A stateless Internet flow filter to mitigate DDOS flooding attacks, in: IEEE Symposium on Security and Privacy, 2004, p. 130 | Khác | |||
[14] X. Wang, M.K. Reiter, Mitigating bandwidth-exhaustion attacks using congestion puzzles, in: ACM Conference on Computer and Communications Security, 2004, pp. 257–267 | Khác | |||
[15] S. Kandula, D. Katabi, M. Jacob, A. Berger, Botz-4-sale: surviving organized DDOS attacks that mimic flash crowds, in: NSDI, 2005 | Khác |
TỪ KHÓA LIÊN QUAN
TRÍCH ĐOẠN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN