Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Inside risks: risks of relying on cryptography
Communications of the ACM
Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Counter hack: a step-by-step guide to computer attacks and effective defenses
Counter hack: a step-by-step guide to computer attacks and effective defenses
Denial of Service: Another Example
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Requirements for a General Framework for Response to Distributed Denial-of-Service
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Hi-index | 0.00 |
By understanding the types of attacks available to an adversary, we can develop more effective defenses against them. A taxonomy of denial-of-service attacks based on a dance-hall metaphor is a step toward gaining such an understanding.