![]() Robert Stone "CenterTrack: An IP Overlay Network for Tracking DoS Floods", Proceedings of the 9th USENIX Security Symposium, Aug 2000.Vern Paxson, "An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks", ACM SIGCOMM Computer Communication Review Vol.The Network Simulator - ns-2, Google Scholar.Drew Dean, Matt Franklin, Adam Stubblefield, "An Algebraic Approach to IP Traceback", Xerox PARC, Rice University, August 2000, Google Scholar.of the ACM SIGCOMM conference 2001, San Diego, CA, Computer Communication Review Vol. Snoeren et al., "Hash-Based IP Traceback", Proc. of 10th IEEE International Conference on Computer Communications and Networks, Oct.2001, Scotsdale Arizona, Google Scholar Felix Wu, Lixia Zhang, "On Design and Evaluation of Intention-Driven ICMP Traceback", Proc. Allison Mankin, Dan Massey, Chien-Long Wu, S.2001, draft-ietf-itrace-intention-00.txt Google Scholar Felix Wu, Lixia Zhang, Dan Massey, Allison Mankin, "Intention-Driven ICMP Traceback", Internet Draft: draft-wu-itrace-intention-00.txt, submission date Feb. att.com/~smb/papers/draft-bellovin-itrace-00.txt Google Scholar Bellovin, "ICMP Traceback Messages", Internet Draft: draft-bellovin-itrace- 00.txt, submitted Mar. Voelker and Stefan Savage, "Inferring Internet Denial-of-Service Activity", Proc of the 10th USENIX Security Symposium, August 2001, Washington D.C., Google Scholar ![]() of the IEEE infocom conference, april 2001, Anchorage, Alaska, Google Scholar Song and Adrian Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback", Proc. of the ACM SIGCOMM conference, August 2000, Stockholm, Sweden, Computer Communication Review Vol.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |