메뉴 건너뛰기




Volumn , Issue , 2002, Pages 181-192

Query-flood DoS attacks in Gnutella

Author keywords

Denial of service; Peer to peer; Security

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; DISTRIBUTED COMPUTER SYSTEMS; MATHEMATICAL MODELS; QUERY LANGUAGES; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 0038687704     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/586110.586136     Document Type: Conference Paper
Times cited : (66)

References (40)
  • 1
    • 0038628641 scopus 로고    scopus 로고
    • Cert advisory ca-2000-01 denial-of-service developments; January
    • Cert advisory ca-2000-01 denial-of-service developments. http://www.cert.org/advisories/CA-2000-01.html, January 2000.
    • (2000)
  • 2
    • 0025603636 scopus 로고
    • A policy model for denial of service
    • Franconia, NH USA, June; IEEE Computer Society Press
    • Edward Amoroso. A policy model for denial of service. In Proc. Computer Security Foundations Workshop III, pages 110-114, Franconia, NH USA, June 1990. IEEE Computer Society Press.
    • (1990) Proc. Computer Security Foundations Workshop III , pp. 110-114
    • Amoroso, E.1
  • 3
    • 0037614402 scopus 로고    scopus 로고
    • lcmp traceback messages
    • lcmp traceback messages. http://www.silicondefense.com/research/itrex/archive/tracing-papers/draft-bello vin-itrace-00.txt.
  • 4
    • 4244200046 scopus 로고    scopus 로고
    • Routing indexes for peer-to-peer systems
    • Technical report, Stanford Univ., CS Dept.
    • Arturo Crespo and Hector Garcia-Molina. Routing indexes for peer-to-peer systems. Technical report, Stanford Univ., CS Dept., 2001.
    • (2001)
    • Crespo, A.1    Garcia-Molina, H.2
  • 7
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. In IETF RFC 2267, 1998.
    • (1998) IETF RFC 2267
    • Ferguson, P.1    Senie, D.2
  • 8
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Computer; April
    • Lee Garber. Denial-of-service attacks rip the internet. Computer, 12-17, April 2000.
    • (2000) , pp. 12-17
    • Garber, L.1
  • 9
    • 0037614421 scopus 로고
    • Operating system support for quality of service
    • Ph. D. Thesis, University of Cambridge
    • E. A. Hyden. Operating system support for quality of service. Ph. D. Thesis, University of Cambridge, 1994.
    • (1994)
    • Hyden, E.A.1
  • 10
    • 0038289935 scopus 로고    scopus 로고
    • Kazaa home page
    • Kazaa home page. http://www.kazaa.com/.
  • 13
    • 0038289923 scopus 로고    scopus 로고
    • Limewire home page
    • Limewire home page. http://www.limewire.com/.
  • 15
    • 0038628626 scopus 로고    scopus 로고
    • Mojo nation technical overview home page
    • Mojo nation technical overview home page. http://www.mojonation.net/docs/technical_overview.shtml.
  • 17
    • 0037614428 scopus 로고    scopus 로고
    • Morpheus home page
    • Morpheus home page. http://www.musiccity.com.
  • 18
    • 0027711242 scopus 로고
    • Denial of service
    • Fairfax, Virginia, November
    • R. M. Néedham. Denial of service. In Proc. 1st ACM CCS, pg 151-153, Fairfax, Virginia, November 1993.
    • (1993) Proc. 1st ACM CCS , pp. 151-153
    • Néedham, R.M.1
  • 19
    • 0028532812 scopus 로고
    • Denial of service: An example
    • Roger M. Needham. Denial of service: an example. Comm. of the ACM, 37(11):42-46, 1994.
    • (1994) Comm. of the ACM , vol.37 , Issue.11 , pp. 42-46
    • Needham, R.M.1
  • 20
    • 84966591863 scopus 로고    scopus 로고
    • Inside risks: Denial-of-service attacks
    • Peter G. Neumann. Inside risks: denial-of-service attacks. Comm. of the ACM, 43(4):136-136, 2000.
    • (2000) Comm. of the ACM , vol.43 , Issue.4 , pp. 136
    • Neumann, P.G.1
  • 21
    • 4244165280 scopus 로고    scopus 로고
    • Flow control algorithm for distributed 'broadcast-route' networks with reliable transport links
    • Flow control algorithm for distributed 'broadcast-route' networks with reliable transport links. http://www.grouter.net/gnutella/flowcntl.htm.
  • 22
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Technical report, Secure Networks, Inc., January
    • T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
    • (1998)
    • Ptacek, T.1    Newsham, T.2
  • 23
    • 0038628618 scopus 로고    scopus 로고
    • Query-flood DoS attacks in gnutella networks (extended version)
    • Technical Report, Stanford Univ. CS Dept.
    • N. Daswani and H. Garcia-Molina. Query-flood DoS Attacks in Gnutella Networks (Extended Version). Technical Report, Stanford Univ. CS Dept.
    • Daswani, N.1    Garcia-Molina, H.2
  • 25
    • 0037614436 scopus 로고    scopus 로고
    • Reputation technologies home page
    • Reputation technologies home page. http://reputation.com.
  • 26
    • 0038628619 scopus 로고    scopus 로고
    • The free haven project: Design and deployment of an anonymous secure data haven
    • MIT Masters Thesis May
    • R. Dingledine. The free haven project: Design and deployment of an anonymous secure data haven. MIT Masters Thesis May 2000.
    • (2000)
    • Dingledine, R.1
  • 27
    • 0037952408 scopus 로고    scopus 로고
    • Sachrifc: Simple flow control for gnutella
    • Sachrifc: Simple flow control for gnutella. http://www.limewire.com/developer/sachrifc.html.
  • 30
    • 0037614434 scopus 로고    scopus 로고
    • Ultrapeers: Another step towards gnutella scalability
    • Ultrapeers: Another step towards gnutella scalability. http://groups.yahoo.com/group/the_gdf/files/Proposals/Ultrapeer/Ultrapeers.h tml.
  • 35
    • 0003844740 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for internet applications
    • Technical Report TR-819, MIT, March
    • I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. Technical Report TR-819, MIT, March 2001.
    • (2001)
    • Stoica, I.1    Morris, R.2    Karger, D.3    Kaashoek, M.4    Balakrishnan, H.5
  • 36
    • 0010294735 scopus 로고    scopus 로고
    • Designing a super-peer network
    • Submitted for publication
    • B. Yang and H. Garcia-Molina. Designing a super-peer network. Submitted for publication.
    • Yang, B.1    Garcia-Molina, H.2
  • 37
    • 0038289902 scopus 로고    scopus 로고
    • Efficient search in peer-to-peer networks
    • Technical report, Stanford Univ., CS Dept.
    • Beverly Yang and Hector Garcia-Molina. Efficient search in peer-to-peer networks. Technical report, Stanford Univ., CS Dept., 2001.
    • (2001)
    • Yang, B.1    Garcia-Molina, H.2
  • 38
    • 0023829320 scopus 로고
    • A formal specification and verification method for the prevention of denial of service
    • Oakland, CA. IEEE Computer Society Press. 117
    • C. Yu and V. Gligor. A formal specification and verification method for the prevention of denial of service. In Proc. 1988 IEEE Symposium on Security and Privacy, pages 187-202, Oakland, CA. IEEE Computer Society Press. 117, 1988.
    • (1988) Proc. 1988 IEEE Symposium on Security and Privacy , pp. 187-202
    • Yu, C.1    Gligor, V.2
  • 39
    • 0003858844 scopus 로고    scopus 로고
    • Tapestry: An infrastructure for fault-resilient wide-area location and routing
    • Technical Report UCB//CSD-01-1141, U. C. Berkeley, April
    • B. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for fault-resilient wide-area location and routing. Technical Report UCB//CSD-01-1141, U. C. Berkeley, April 2001.
    • (2001)
    • Zhao, B.1    Kubiatowicz, J.2    Joseph, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.