THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 124 |
Dung lượng | 3,48 MB |
Nội dung
Ngày đăng: 30/03/2020, 23:21
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
[2] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970 | Sách, tạp chí |
|
||
[6] M. Ester, H.P. Kriegel, J. Sander and X. Xu, “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise,” in Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, 1996 | Sách, tạp chí |
|
||
[20] F. Kargl, J. Maier, and M. Weber, “Protecting web servers from distributed denial of service attacks,” in WWW ’01: Proceedings of the 10th international conference on World Wide Web.NewYork, NY, USA: ACM Press, 2001, pp. 514–524 | Sách, tạp chí |
|
||
[7] M.I. MIT, in Darpa Intrusion Detection Evaluation. Retrieved from Lincoln Laboratory: https://www.ll.mit.edu/ideval/data/1998data.html | Link | |||
[9] J. Lo et al., An IRC Tutorial, April, 2003, irchelp.com 1997, [online] http://www.irchelp.org/irchelp/irctutorial.html#part1 | Link | |||
[18] K. Park, and H. Lee, On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets, n Proc. ACM SIGCOMM, August 2001.[19] Bysin, knight.c sourcecode, 2001, [online]http://packetstormsecurity.org/distributed/ knight.c | Link | |||
[27] C. Wilson , DDoS and Security Reports: The Arbor Networks Security Blog, Arbor Networks, 2011, [online] http://ddos.arbornetworks.com/2012/02/ddos-tools/ | Link | |||
[35] R. Puri, Bots and Botnet – an overview, Aug. 08, 2003, [online] http://www.giac.org/practical/GSEC/Ramneek Puri GSEC.pdf | Link | |||
[44] Lawrence Berkeley National Laboratory (LBNL), ICSI, LBNL/ICSI Enterprise Tracing Project, 2005. (http://www.icir.org/enterprise-tracing/) | Link | |||
[54] KDD Cup 1999. Online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, Ocotber 2007 | Link | |||
[58] J. Nazario, BlackEnergy DDoS Bot Analysis, Arbor Networks, 2007, [online] http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+ Analysis.pdf | Link | |||
[60] team-cymru Inc., A Taste of HTTP Botnets, July, 2008, [online] http://www.team- cymru.com/ReadingRoom/Whitepapers/2008/http-botnets.pdf | Link | |||
[71] Praetox Technologies Low Orbit Ion Cannon, 2010, [online] https://github.com/NewEraCracker/LOIC/ | Link | |||
[77] CAIDA, The Cooperative Analysis for Internet Data Analysis, 2011. (http://www.caida.org) | Link | |||
[80] C. Wilson, DDoS and Security Reports: The Arbor Networks Security Blog, Arbor Networks, 2011, [online] http://ddos.arbornetworks.com/2012/02/ddos-tools/ | Link | |||
[86] RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioRey Taxonomy Rev 2.3 2012, 2012. [online] http://www.riorey.com/x-resources/2012/RioRey Taxonomy DDoS Attacks 2012.pdf | Link | |||
[87] S. Shekyan, Are you ready for slow reading? Jan. 5, 2012, [online] https://community.qualys.com/blogs/securitylabs/2012/01/05/slow-read | Link | |||
[88] ha.ckers.org, Slowloris HTTP DoS, Retrieved Oct. 19, 2012, [online] http://ha.ckers.org/slowloris/ | Link | |||
[105] Mananet, Reverse Firewall, [online] http://www.cs3–inc.com/pubs/Reverse FireWall.pdf | Link | |||
[106] Arbor networks. worldwide infraestructure security report. vol. 4., <http://www.arbornetworks.com/en/research.html>.[107] http://acdt2018.org/ | Link |
TỪ KHÓA LIÊN QUAN
TRÍCH ĐOẠN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN