Check out the new USENIX Web site. next up previous
Next: About this document ... Up: MULTOPS: a data-structure for Previous: Acknowledgements

Bibliography

AH99
Thamer Al-Herbish.
Secure Unix Programming FAQ, 1999.
Available at
https://www.whitefang.com/sup/secure-faq.html.

Bel00
Bellovin.
ICMP Traceback Messages.
Technical report, AT&T, 2000.
Available at https://www.ietf.org/internet-drafts/draft-bellovin-itrace-00.txt.

Bel01
Steven Bellovin.
DDoS Attacks and Pushback, February 2001.
NANOG 21, Atlanta, GA, USA.

CC96
CERT Coordination Center.
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, 1996.
Available at https://www.cert.org/advisories/CA-1996-21.html.

CC98
CERT Coordination Center.
CERT Advisory CA-98.01 ``smurf'' IP Denial-of-Service Attacks, 1998.
Available at https://www.cert.org/advisories/CA-98.01.smurf.html.

Cisa
Cisco.
Netflow Services and Applications.
Available at https://www.cisco.com/warp/public/732/netflow/.

Cisb
Cisco.
RMON.
Available at https://www.cisco.com/warp/public/614/4.html.

CNN00a
CNN.
Cyber-attacks batter Web heavyweights, February 2000.
Available at https://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/index.html.

CNN00b
CNN.
`Immense' network assault takes down Yahoo, February 2000.
Available at https://www.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/index.html.

DFS01
Drew Dean, Matt Franklin, and Adam Stubblefield.
An Algebraic Approach to IP Traceback.
In Proceedings of the 2001 Network and Distributed Systems Security Symposium, February 2001.

Dit00
Dave Dittrich.
The DoS Project's `trinoo' distributed denial of service attack tool.
Technical report, University of Washington, 2000.
Available at https://staff.washington.edu/dittrich/misc/trinoo.analysis.txt.

ea81
J. Postel et al.
RFC 792. Internet Control Message Protocol.
Technical report, IETF, 1981.
Available at https://sunsite.cnlab-switch.ch/ftp/doc/standard/rfc/7xx/792.

ea00
P. Ferguson et al.
RFC 2827. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing.
Technical report, IETF, February 2000.
Available at https://sunsite.cnlab-switch.ch/ftp/doc/standard/rfc/28xx/2827.

ec00
The electrohippies collective.
Client-side Distributed Denial-of-Service, 2000.
Available at https://www.gn.apc.org/pmhp/ehippies/files/op1.pdf.

Ins00
SANS Institute.
Egress filtering v 0.2, 2000.
Available at https://www.sans.org/y2k/egress.htm.

KMC$^+$00
Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M. Frans Kaashoek.
The click modular router.
ACM Transactions on Computer Systems, 18(3):263-297, August 2000.

Net00
Netscape.
Leading Web sites under attack, February 2000.
Available at
https://technews.netscape.com/news/0-1007-200-1545348.html.

Pac00
Packetstorm.
Packetstorm, 2000.
Available at https://packetstorm.securify.com.

Pax97
Vern Paxson.
End-to-End Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking, Vol.5, No.5:601-615, October 1997.

Pax99
Vern Paxson.
Bro: A System for Detecting Network Intruders in Real-Time.
Computer Networks, 31(23-24):2435-2463, December 1999.

SP01
Dawn Xiaodong Song and Adrian Perrig.
Advanced and Authenticated Marking Schemes for IP Traceback.
In Proceedings of the IEEE Infocom 2001, April 2001.

Spi00
Lance Spitzner.
The Tools and Methodologies of the Script Kiddie. Know Your Enemy, 2000.
Available at https://www.enteract.com/~lspitz/enemy.html.

Sto99
Robert Stone.
CenterTrack: An IP Overlay Network for Tracking DoS Floods, October 1999.
NANOG 17, Montreal, Canada.

SWKA00
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson.
Practical Network Support for IP Traceback.
In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295-306, August 2000.



2001-05-11