메뉴 건너뛰기




Volumn 3, Issue , 2000, Pages 2275-2280

Distributed denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; QUEUEING NETWORKS; QUEUEING THEORY; ROUTERS;

EID: 0034497721     PISSN: 08843627     EISSN: None     Source Type: Journal    
DOI: 10.1109/ICSMC.2000.886455     Document Type: Article
Times cited : (266)

References (23)
  • 1
    • 0005246691 scopus 로고    scopus 로고
    • The CAST-256 encryption algorithm
    • C. Adams J. Gilchrist The CAST-256 encryption algorithm June 1999 RFC 2612 http://www.cis.ohio-state.edu/htbin/rfc/rfc2612.html
    • (1999)
    • Adams, C.1    Gilchrist, J.2
  • 2
    • 85177134856 scopus 로고    scopus 로고
    • J. Barlow W. Thrower TFN2K-an analysis Feb. 2000 http://packetstorm.securify.com/distributed/TFN2k_ Analysis.htm
    • (2000)
    • Barlow, J.1    Thrower, W.2
  • 3
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • S. Bellovin Security problems in the TCP/IP protocol suite Comput. Commun. Rev. 19 2 32 48 Apr. 1989
    • (1989) Comput. Commun. Rev. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.1
  • 4
    • 85177124760 scopus 로고    scopus 로고
    • S. Bellovin Distributed denial of service attacks Feb. 2000 http://www.research.att.com/~smb/talks
    • (2000)
    • Bellovin, S.1
  • 5
    • 0004194675 scopus 로고    scopus 로고
    • The ICMP traceback message
    • The ICMP traceback message Mar. 2000 http://www. research.att.com/~smb/papers/draft-bellovin-itrace-00.txt
    • (2000)
  • 6
    • 85177122240 scopus 로고    scopus 로고
    • CA-2000-01 denial-of-service developments CERT® Coordination Center http://www.cert.org/advisories/CA-2000-01.html
  • 7
    • 85177128085 scopus 로고    scopus 로고
    • CA-99-17 denial-of-service tools http://www.cert.org/advisories/CA-99-17-denial-of-service-tools.html
  • 8
    • 85177131322 scopus 로고    scopus 로고
    • CA-98-13-tcp-denial-of-service: vulnerability in certain TCP/IP implementations http://www.cert.org/advisories/CA-98-13-tcp-denial-of-service.html
  • 9
    • 85177115991 scopus 로고    scopus 로고
    • Results of the distributed systems intruder tools workshop Results of the distributed systems intruder tools workshop 1999-Nov. CERT® Coordination Center http://www.cert.org/reports/dsit_workshop.pdf
    • (1999)
  • 10
    • 85177105286 scopus 로고    scopus 로고
    • Defining strategies to protect against TCP SYN denial of service attacks July 1999 Cisco Systems, Inc. http://www.cisco.com/warp/public/707/4.html
    • (1999)
  • 11
    • 85177126328 scopus 로고    scopus 로고
    • IP-spoofing demystified: trust-relationship exploitation
    • IP-spoofing demystified: trust-relationship exploitation Phrack Mag. June 1996 Daemon9, Infinity, and Route http:.//www.fc.net/phrack/files/p48/p48-14.html
    • (1996) Phrack Mag.
  • 12
    • 1242350165 scopus 로고    scopus 로고
    • The DoS project's 'Trinoo' distributed denial of service attack tool
    • D. Dittrich The DoS project's 'Trinoo' distributed denial of service attack tool Oct. 1999
    • (1999)
    • Dittrich, D.1
  • 13
    • 85177123717 scopus 로고    scopus 로고
  • 14
    • 85177139714 scopus 로고    scopus 로고
    • The 'Tribe Flood Network' distributed denial of service attack tool Oct. 1999 http://www.washington.edu/People/dad
    • (1999)
  • 15
    • 85177117978 scopus 로고    scopus 로고
    • D. Dittrich S. Dietrich N. Long An analysis of the 'Shaft' distributed denial of device tool Mar. 2000 http://netsec.gsfc.nasa.gov/~spock/shaft_analysis.txt
    • (2000)
    • Dittrich, D.1    Dietrich, S.2    Long, N.3
  • 16
    • 85177125382 scopus 로고    scopus 로고
    • P. Ferguson D. Senie RFC 2267: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing Jan. 1998 http://info.internet.isi.edu/in-notes/rfc/files/rfc2267.txt
    • (1998)
    • Ferguson, P.1    Senie, D.2
  • 17
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • S. Floyd V. Jacobson Random early detection gateways for congestion avoidance IEEE/ACM Trans. Networking 1 4 397 413 Aug. 1993
    • (1993) IEEE/ACM Trans. Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 18
    • 0029356674 scopus 로고
    • Link-sharing and resource management models for packet networks
    • S. Floyd V. Jacobson Link-sharing and resource management models for packet networks IEEE/ACM Trans. Networking 3 4 365 386 Aug. 1995
    • (1995) IEEE/ACM Trans. Networking , vol.3 , Issue.4 , pp. 365-386
    • Floyd, S.1    Jacobson, V.2
  • 19
    • 85177109943 scopus 로고    scopus 로고
    • A. Harrison The denial-of-service aftermath Feb. 2000 http://www.cnn.com/2000/TECH/computing/02/14/dos.aftermath.idg/index.html
    • (2000)
    • Harrison, A.1
  • 20
    • 85177123937 scopus 로고    scopus 로고
    • C. A. Huegen The latest in denial of service attacks: 'Smurfing' description and information to minimize effects Feb. 2000 http://users.quadrunner.com/chuegen/smurf.cgi
    • (2000)
    • Huegen, C.A.1
  • 21
    • 85177142249 scopus 로고    scopus 로고
    • B. Martin Have script, will destroy (lessons in DoS) Feb. 2000 http://www.attrition.org
    • (2000)
    • Martin, B.1
  • 22
    • 85177143809 scopus 로고    scopus 로고
    • ns-2 network simulator http://www.isi.edu/nsnam/ns
  • 23
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: eluding network intrusion detection
    • Secure Networks, Inc.
    • T. H. Ptacek T. N. Newsham Insertion, evasion, and denial of service: eluding network intrusion detection Jan. 1998 Secure Networks, Inc. http://www.clark.net/~roesch/idspaper.html
    • (1998)
    • Ptacek, T.H.1    Newsham, T.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.