- J. Mirkovic and P. Reiher,
D-WARD: A Source-End Defense Against
Flooding Denial-of-Service Attacks, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232
- J. Mirkovic and
P. Reiher, A Taxonomy of DDoS Attacks
and Defense Mechanisms, ACM SIGCOMM Computer Communications Review, Volume 34, Number 2, April 2004, pp. 39-54.
- V. Milutinovic,
D. Cvetkovic and J. Mirkovic, Genetic
Search Based on Multiple Mutations, IEEE Computer, pp. 118-119,
November 2000.
|
- M. Natu and J. Mirkovic, Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations, Proceedings of the Large-Scale Attack and Defense Workshop, August 2007
- J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao, and S. Schwab, Towards User-Centric Metrics for Denial-Of-Service Measurement, Proceedings of the Workshop on Experimental Computer Science, June 2007
- J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov and P. Reiher DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed, Proceedings of the Tridentcom 2007, May 2007.
- J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, W. Yao, P. Reiher, S. Schwab and R. Thomas When Is Service Really Denied? A User-Centric DoS Metric, Proceedings of the Sigmetrics 2007, June 2007
- J. Mirkovic, E.
Arikan, S. Wei, S. Fahmy, R. Thomas, and P. Reiher Benchmarks for DDoS Defense Evaluation, Proceedings of the
Milcom 2006, October 2006
- J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab and C. Ko Measuring Denial-of-Service, Proceedings of the 2006 Quality of Protection Workshop, October 2006
- G. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson, A Framework for Collaborative DDoS Defense, Proceedings of ACSAC 2006, December 2006
- S. Wei and J. Mirkovic, Building Reputations for Internet Clients, Proceedings of the STM 2006, September 2006
- S. Wei and J. Mirkovic, A Realistic Simulation of Internet-Scale Events, Proceedings of the 2006 VALUETOOLS Conference, October 2006
- S. Wei, J. Mirkovic and E. Kissel, Profiling and Clustering Internet Hosts, Proceedings of the 2006 International Conference on Data Mining, June 2006
- S. Wei, J. Mirkovic, and M. Swany Distributed Worm Simulation with a Realistic Internet Model, Proceedings of the 2005 Symposium on Modelling and Simulation of Malware, June 2005
- J. Mirkovic, M.
Robinson, P. Reiher, and G. Kuenning, Alliance
Formation for DDoS Defense, Proceedings of the New Security
Paradigms Workshop, ACM SIGSAC, August 2003.
- J. Mirkovic, G.
Prier and P. Reiher, Challenges
of Source-End DDoS Defense, Proceedings of 2nd IEEE International
Symposium on Network Computing and Applications, April 2003.
- J. Mirkovic, G.
Prier and P. Reiher, Attacking
DDoS at the Source, Proceedings of 10th IEEE International Conference
on Network Protocols, November 2002.
- M. Burns, G. Prier,
J. Mirkovic, P. Reiher, Implementing
Address Assurance in the Intel IXP Router, Proceedings of Network
Processors Conference, October 2002.
- J. Li, J. Mirkovic,
M. Wang, P. Reiher and L. Zhang, SAVE:
Source Address Validity Enforcement Protocol, Proceedings of
INFOCOM, June 2002.
- J. Mirkovic, G.
P. Venkataramani, S. Lu, and L. Zhang, A
Self-Organizing Approach to Data Forwarding In Large-Scale Sensor Networks,
Proceedings of International Conference on Communications, June 2001.
|
- J. Mirkovic, N. Jevtic and P. Reiher, A Practical IP Spoofing Defense Through Route-Based Filtering, University of Delaware CIS Department Technical Report CIS-TR-2006-332.
- J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, Distributed Defense Against DDOS Attacks, University of Delaware CIS Department
Technical Report CIS-TR-2005-02.
- J. Mirkovic, J.
Martin and P. Reiher, A
Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, UCLA CSD
Technical Report CSD-TR-020018.
- J. Mirkovic, G.
Prier and P. Reiher, Source
Router Approach to DDoS Defense, UCLA CSD Technical Report CSD-TR-010042.
- J. Mirkovic, Z.
Xu, J. Li, M. Schnaider, P. Reiher and L. Zhang, iSAVE:
Incrementally Deployable Source Address Validation, UCLA CSD
Technical Report CSD-TR-020030.
- J. Li, J. Mirkovic,
M. Wang, P. Reiher and L. Zhang, SAVE:
Source Address Validity Enforcement Protocol, UCLA Technical
Report CSD-TR-010004.
|