SYN cookies

Results: 33



#Item
21Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula Dina Katabi MIT {kandula,dina}@csail.mit.edu

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula Dina Katabi MIT {kandula,dina}@csail.mit.edu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:54
22AL  Chapter 1: Defending against Common Attacks with Basic Security Tools ✓ Identifying external attack methods

AL Chapter 1: Defending against Common Attacks with Basic Security Tools ✓ Identifying external attack methods

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-25 19:10:46
23ERT THREAT ALERT Tsunami SYN Flood Attack ERT Threat Alert Tsunami SYN Flood Attack, Oct 7, 2014

ERT THREAT ALERT Tsunami SYN Flood Attack ERT Threat Alert Tsunami SYN Flood Attack, Oct 7, 2014

Add to Reading List

Source URL: www.sectec.sk

Language: English - Date: 2014-10-09 09:28:48
24Scaling Userspace @ Facebook  Ben Maurer [removed]  !

Scaling Userspace @ Facebook Ben Maurer [removed] !

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-15 09:33:01
25A Readable TCP in the Prolac Protocol Language Eddie Kohler, M. Frans Kaashoek, and David R. Montgomery M.I.T. Laboratory for Computer Science Cambridge, MA 02139, USA {eddietwo, kaashoek, dmontgom}@lcs.mit.edu http://ww

A Readable TCP in the Prolac Protocol Language Eddie Kohler, M. Frans Kaashoek, and David R. Montgomery M.I.T. Laboratory for Computer Science Cambridge, MA 02139, USA {eddietwo, kaashoek, dmontgom}@lcs.mit.edu http://ww

Add to Reading List

Source URL: www.lcdf.org

Language: English - Date: 1999-06-09 12:23:11
26Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection Martin Casado Aditya Akella Pei Cao Niels Provos Scott Shenker

Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection Martin Casado Aditya Akella Pei Cao Niels Provos Scott Shenker

Add to Reading List

Source URL: yuba.stanford.edu

Language: English - Date: 2006-06-06 18:58:33
27Knock: Practical and Secure Stealthy Servers Julian Kirsch TU Munich [removed]  Maurice Leclaire

Knock: Practical and Secure Stealthy Servers Julian Kirsch TU Munich [removed] Maurice Leclaire

Add to Reading List

Source URL: gnunet.org

Language: English - Date: 2013-12-11 11:17:32
28Hashcash - A Denial of Service Counter-Measure Adam Back e-mail: [removed] 1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

Hashcash - A Denial of Service Counter-Measure Adam Back e-mail: [removed] 1st August 2002 Abstract Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:52
29The Distributed Reflection DoS Attack  Page 1 of 24 Distributed Reflection Denial of Service Description and analysis of a potent, increasingly

The Distributed Reflection DoS Attack Page 1 of 24 Distributed Reflection Denial of Service Description and analysis of a potent, increasingly

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2005-06-29 13:02:53
30TCP Fast Open draft-cheng-tcpm-fastopen-00.txt

TCP Fast Open draft-cheng-tcpm-fastopen-00.txt

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2011-03-30 18:10:05