Documents Related by Co-Citation

530 Practical network support for IP traceback – Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson - 2000
277 Implementing Pushback: Router-Based Defense Against DDoS Attacks – John Ioannidis, Steven M. Bellovin - 2002
114 Mayday: Distributed Filtering for Internet Services – David G. Andersen - 2003
231 On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets – Kihong Park, Heejo Lee - 2001
243 Advanced and Authenticated Marking Schemes for IP Traceback – Dawn X. Song, Dawn Xiaodong Song, Adrian Perrig, Adrian Perrig - 2000
547 Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing – P Ferguson, D Senie - 1998
201 Centertrack: An IP overlay network for tracking DoS floods – Robert Stone - 2000
184 An algebraic approach to IP traceback – Drew Dean, Matt Franklin, Adam Stubblefield - 2002
109 Preventing Internet Denial-of-Service with Capabilities – Tom Anderson , Timothy Roscoe, David Wetherall - 2003
146 S.: Inferring Internet denial of service activity – D Moore, G Voelker, Savage
2677 A Scalable Content-Addressable Network – Sylvia Ratnasamy , Paul Francis, Mark Handley, Richard Karp, Scott Shenker - 2001
119 MULTOPS: a data-structure for bandwidth attack detection – Thomer M. Gil, Massimiliano Poletto - 2001
109 Analysis of a Denial of Service Attack on TCP – Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni - 1997
248 Controlling high bandwidth aggregates in the network – Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, Scott Shenker - 2002
152 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks – Vern Paxson - 2001
142 Pi: A Path Identification Mechanism to Defend against DDoS Attacks – Abraham Yaar, Adrian Perrig, Dawn Song - 2003
986 Resilient Overlay Networks – David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris - 2001
324 Internet Indirection Infrastructure – Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana - 2002
154 Client puzzles: A cryptographic countermeasure against connection depletion attacks – A Juels, J Brainard - 1999