skip to main content
10.1145/366173.366202acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Incentives to help stop floods

Authors Info & Claims
Published:20 February 2001Publication History
First page image

References

  1. 1.Bruce Schneier. Distributed Denial-of-Service Attacks. In CRYPTO-GRAM, February 15, 2000. http://www.counterpane.com/crypto-gram-0002.htmlGoogle ScholarGoogle Scholar
  2. 2.Bruce Schneier, same place.Google ScholarGoogle Scholar
  3. 3.Thomas E. Daniels & Eugene H. Spafford. Network Traffic Tracking Systems: Folly in the Large? In Proceedings of New Security Paradigms Workshop 2000, Ballycotton, Ireland, September 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Dan Schnackenberg, Kelly Djahandari and Dan Sterne. Infrastructure for Intrusion Detection and Response. In Proceedings of the DARPA Information Survivability Conference & Exposition Volume II of II. 1998. http://www.nai.com/nai labs/media/pdf/D1SCEX- IDR-In frastructure.pdfGoogle ScholarGoogle Scholar
  5. 5.Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, and Steve R. White. Blueprint for a Computer Immune System. Presented at the Virus Bulletin International Conference in San Francisco, California, 1997. http://www,av.ibm.com/InsideTheLab/Bookshelf/Scie ntificPapers/Kephart/VB97/Google ScholarGoogle Scholar
  6. 6.Dan Schnackenberg et al. Same place.Google ScholarGoogle Scholar
  7. 7.Dan Schnackenberg, personal communication, 8/1 8/00Google ScholarGoogle Scholar
  8. 8.Dan Schnackenberg, personal communication, 8/18/00Google ScholarGoogle Scholar
  9. 9.John McHugh. Remark at 2000 New Security Paradigms Workshop, during discussion of this paper.Google ScholarGoogle Scholar
  10. 10.Brenda Timmerman. Secure Dynamic Adaptive Traffic Masking. In Proceedings of New Security Paradigms Workshop 1999, Caledon Hills, Ontario, Canada, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Incentives to help stop floods

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        NSPW '00: Proceedings of the 2000 workshop on New security paradigms
        February 2001
        168 pages
        ISBN:1581132603
        DOI:10.1145/366173

        Copyright © 2001 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 February 2001

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        NSPW '00 Paper Acceptance Rate15of35submissions,43%Overall Acceptance Rate62of170submissions,36%
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader