메뉴 건너뛰기




Volumn , Issue , 2003, Pages 78-92

Defending against denial-of-service attacks with puzzle auctions

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; INTERNET; INTEROPERABILITY; NETWORK PROTOCOLS; SERVERS;

EID: 0038825046     PISSN: 10637109     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (91)

References (23)
  • 4
    • 0038650772 scopus 로고    scopus 로고
    • Defending against sequence number attacks
    • May
    • S. Bellovin. Defending against sequence number attacks. In RFC 1948, May, 1996.
    • (1996) RFC 1948
    • Bellovin, S.1
  • 6
    • 0037636199 scopus 로고    scopus 로고
    • Computer emergency response team, CERT advisory ca-2001-01: Denial-of-service developments
    • CERT
    • CERT. Computer emergency response team, CERT advisory ca-2001-01: Denial-of-service developments. In http://staff.washington.edu/dittrich/misc/ddos, 2000.
    • (2000)
  • 7
    • 4143130116 scopus 로고    scopus 로고
    • Denial of service attacks
    • CERT; June 4
    • CERT. Denial of service attacks. In http://www.cert.org/tech_tips/denial_of_service.html, June 4 2001.
    • (2001)
  • 8
    • 84871109649 scopus 로고    scopus 로고
    • Advisory ca-96.21: Tcp syn flooding and IP spoofing attacks
    • CERT; September 24
    • CERT. Advisory ca-96.21: Tcp syn flooding and IP spoofing attacks. September 24 1996.
    • (1996)
  • 11
    • 25344461816 scopus 로고    scopus 로고
    • Distributed denial of service (ddos) attacks/tools resource page
    • D. Dittrich. Distributed denial of service (ddos) attacks/tools resource page. In http://staff.washington.edu/dittrich/misc/ddos, 2000.
    • (2000)
    • Dittrich, D.1
  • 15
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • July-August
    • X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July-August 2000.
    • (2000) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-41
    • Geng, X.1    Whinston, A.2
  • 17
    • 0003976889 scopus 로고    scopus 로고
    • Trends in denial of service attack technology
    • October
    • K. Houle, G. Weaver, N. Long, and R. Thomas. Trends in denial of service attack technology. In http://www.cert.org/archive/pdf/DoS_trends.pdf, October 2001.
    • (2001)
    • Houle, K.1    Weaver, G.2    Long, N.3    Thomas, R.4
  • 18
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • In S. Kent, editor
    • A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S. Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
    • (1999) Proceedings of NDSS'99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 20
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • R. C. Merkle. Secure communications over insecure channels. 21:294-299, April 1978.
    • (1978) , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 22
    • 0010602889 scopus 로고    scopus 로고
    • Time-lock puzzles and timed-release crypto
    • 10 March
    • R. L. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release crypto. 10 March 1996.
    • (1996)
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.