메뉴 건너뛰기




Volumn 52, Issue 2, 2003, Pages 195-208

Sustaining availability of web services under distributed denial of service attacks

Author keywords

Availability; Distributed Denial of Service (DDoS); Game theory; Survivability; World Wide Web

Indexed keywords

COMPUTER SIMULATION; CRYPTOGRAPHY; DOS; ELECTRONIC COMMERCE; GAME THEORY; NETWORK PROTOCOLS; ROUTERS; TELECOMMUNICATION TRAFFIC; WEBSITES;

EID: 0037328484     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2003.1176986     Document Type: Article
Times cited : (120)

References (46)
  • 5
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • Dec.
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. Usenix LISA 2000, Dec. 2000.
    • (2000) Proc. Usenix LISA 2000
    • Burch, H.1    Cheswick, B.2
  • 6
    • 0033885344 scopus 로고    scopus 로고
    • Performance of hashing-based schemes for Internet load balancing
    • Mar.
    • Z. Cao, Z. Wang, and E. Zegura, "Performance of Hashing-Based Schemes for Internet Load Balancing," Proc. Infocom 2000, Mar. 2000.
    • (2000) Proc. Infocom 2000
    • Cao, Z.1    Wang, Z.2    Zegura, E.3
  • 13
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • Apr.
    • L. Garber, "Denial-of-Service Attacks Rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, Apr. 2000.
    • (2000) Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 14
    • 85084163167 scopus 로고    scopus 로고
    • Multops: A data-structure for bandwidth attack detection
    • Aug.
    • T. Gil and M. Poletto, "Multops: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., Aug. 2001.
    • (2001) Proc. 10th Usenix Security Symp.
    • Gil, T.1    Poletto, M.2
  • 15
    • 0031244719 scopus 로고    scopus 로고
    • Modeling the performance of http over several transport protocols
    • Oct.
    • J. Heidemann, K. Obraczka, and J. Touch, "Modeling the Performance of http over Several Transport Protocols," IEEE/ACM Trans. Networking, vol. 5, no. 5, pp. 616-630, Oct. 1997.
    • (1997) IEEE/ACM Trans. Networking , vol.5 , Issue.5 , pp. 616-630
    • Heidemann, J.1    Obraczka, K.2    Touch, J.3
  • 22
    • 85034043506 scopus 로고    scopus 로고
    • Protecting web servers from distributed denial of service attacks
    • May
    • F. Kargl, J. Maier, S. Schlott, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," WWW-10, May 2001.
    • (2001) WWW-10
    • Kargl, F.1    Maier, J.2    Schlott, S.3    Weber, M.4
  • 24
    • 0031373091 scopus 로고    scopus 로고
    • An empirical model of http network traffic
    • Apr.
    • B. Mah, "An Empirical Model of http Network Traffic," Proc. Infocom '97, Apr. 1997.
    • (1997) Proc. Infocom '97
    • Mah, B.1
  • 27
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • C. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm. Magazine, Sept. 1994, W. Stallings, Practical Cryptography for Data Internetworks, IEEE CS Press, 1996.
    • (1994) IEEE Comm. Magazine
    • Neuman, C.1    Ts'o, T.2
  • 30
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • Apr.
    • K. Park and H. Lee, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Proc. IEEE Infocom 2001, Apr. 2000.
    • (2000) Proc. IEEE Infocom 2001
    • Park, K.1    Lee, H.2
  • 31
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law Internets
    • Aug.
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DOS Attack Prevention in Power-Law Internets," Proc. ACM Sigcomm 2001, Aug. 2001.
    • (2001) Proc. ACM Sigcomm 2001
    • Park, K.1    Lee, H.2
  • 32
    • 0032097258 scopus 로고    scopus 로고
    • A 50-gb/s IP router
    • June
    • C. Partridge et al., "A 50-gb/s IP Router," IEEE/ACM Trans. Networking, vol. 6, no. 3, pp. 237-248, June 1998.
    • (1998) IEEE/ACM Trans. Networking , vol.6 , Issue.3 , pp. 237-248
    • Partridge, C.1
  • 38
    • 85013295511 scopus 로고
    • Efficient fair queuing using deficit round robin
    • Aug.
    • M. Shreedhar and G. Varghese, "Efficient Fair Queuing Using Deficit Round Robin," Proc. ACM SIGCOMM '95, pp. 231-242, Aug. 1995.
    • (1995) Proc. ACM SIGCOMM '95 , pp. 231-242
    • Shreedhar, M.1    Varghese, G.2
  • 40
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IF traceback
    • Apr.
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IF Traceback," Proc. Infocom 2001, Apr. 2001.
    • (2001) Proc. Infocom 2001
    • Song, D.1    Perrig, A.2
  • 45
    • 84894342690 scopus 로고
    • RSVP: A new resource ReSerVation protocol
    • Sept.
    • L. Zhang, S. Deering, and D. Estrin, "RSVP: A New Resource ReSerVation Protocol," IEEE Network, vol. 7, no. 5, pp. 8-18, Sept. 1993.
    • (1993) IEEE Network , vol.7 , Issue.5 , pp. 8-18
    • Zhang, L.1    Deering, S.2    Estrin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.