메뉴 건너뛰기




Volumn 1, Issue , 2002, Pages 411-427

Defending against distributed denial of service attacks using selective pushback

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; INTERNET; NETWORK PROTOCOLS; PACKET SWITCHING; PROBABILITY; ROUTERS; SECURITY OF DATA; SIGNAL FILTERING AND PREDICTION; TELECOMMUNICATION TRAFFIC;

EID: 0141760371     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (23)
  • 1
    • 0004194675 scopus 로고    scopus 로고
    • Internet Draft, IETF, March; draft-bellovin-itrace-05.txt (work in progress)
    • S. Bellovin. The icmp traceback message. Internet Draft, IETF, March 2000. draft-bellovin-itrace-05.txt (work in progress). http://www.research.att.com/~smb.
    • (2000) The Icmp Traceback Message
    • Bellovin, S.1
  • 6
    • 4243817525 scopus 로고    scopus 로고
    • Auckland university data traces
    • Waikato Applied Network Dynamics Research Group
    • Waikato Applied Network Dynamics Research Group. Auckland university data traces. http://wand.cs.waikato.ac.nz/wand/wits/.
  • 8
    • 0141773064 scopus 로고    scopus 로고
    • Pushback: Router-based defense against ddos attacks
    • AT&T Labs Research, February
    • John Ionnidis and Steven M. Bellovin. Pushback: Router-based defense against ddos attacks. AT&T Labs Research, February 2001.
    • (2001)
    • Ionnidis, J.1    Bellovin, S.M.2
  • 11
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 12
    • 0003552333 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network
    • Technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, February
    • Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ionnidis, Vern Paxson, and Scott Shenker. Controlling high bandwidth aggregates in the network. Technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, February 2001.
    • (2001)
    • Mahajan, R.1    Bellovin, S.M.2    Floyd, S.3    Ionnidis, J.4    Paxson, V.5    Shenker, S.6
  • 13
    • 14644406412 scopus 로고    scopus 로고
    • Countering syn flood denial-of-service attacks
    • August 29
    • Ross Oliver. Countering syn flood denial-of-service attacks, August 29 2001. http://www.usenix.org/events/sec01/invitedtalks/oliver.pdf.
    • (2001)
    • Oliver, R.1
  • 14
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack
    • K. Park and H. Lee. On the effectiveness of probabilistic packet marking for ip traceback under denial of service attack. In Proceedings of IEEE IFOCOM 2001, 2001.
    • Proceedings of IEEE IFOCOM 2001, 2001
    • Park, K.1    Lee, H.2
  • 16
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • July
    • Vern Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR), 31(3), July 2001.
    • (2001) ACM Computer Communications Review (CCR) , vol.31 , Issue.3
    • Paxson, V.1
  • 20
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip traceback
    • Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for ip traceback. In Proceedings of IEEE INFOCOM 2001, 2001. http://paris.cs.berkeley.edu/perrig/projects/iptraceback/tr-iptrace.ps.gz.
    • Proceedings of IEEE INFOCOM 2001, 2001
    • Song, D.X.1    Perrig, A.2
  • 22
    • 0038417435 scopus 로고    scopus 로고
    • A defense against address spoofing using active networks
    • MIT Master Thesis
    • Van Van. A defense against address spoofing using active networks, 1997. MIT Master Thesis.
    • (1997)
    • Van, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.