메뉴 건너뛰기




Volumn 14, Issue 9, 2003, Pages 861-872

IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks

Author keywords

Distributed denial of service (DDoS); IP traceback; Performance modeling and simulation

Indexed keywords

COMPUTER SIMULATION; INTERNET; NETWORK PROTOCOLS; PACKET SWITCHING; PROBABILITY; SIGNAL FILTERING AND PREDICTION; TELECOMMUNICATION TRAFFIC;

EID: 0142039750     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2003.1233709     Document Type: Article
Times cited : (103)

References (25)
  • 1
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Apr.
    • L. Garber, "Denial-of-Service Attacks Rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, Apr. 2000.
    • (2000) Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 5
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. Infocom, Apr. 2001.
    • Proc. Infocom, Apr. 2001
    • Song, D.1    Perrig, A.2
  • 8
    • 0004194675 scopus 로고    scopus 로고
    • Internet draft: ICMP traceback messages
    • technical report, Network Working Group, Mar.
    • S. Bellovin, "Internet Draft: ICMP Traceback Messages," technical report, Network Working Group, Mar. 2000.
    • (2000)
    • Bellovin, S.1
  • 9
    • 0003552333 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network
    • technical report, ACIRI and AT&T Labs Research, Feb.
    • R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," technical report, ACIRI and AT&T Labs Research, Feb. 2001.
    • (2001)
    • Mahajan, R.1    Bellovin, S.2    Floyd, S.3    Ioannidis, J.4    Paxson, V.5    Shenker, S.6
  • 10
    • 0142067284 scopus 로고    scopus 로고
    • Internet mapping
    • B. Cheswick, "Internet Mapping," available at http://cm.bell-labs.com/who/ches/map/dbs/index.html, 1999.
    • (1999)
    • Cheswick, B.1
  • 11
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm, ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Comm, ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 12
    • 0142098941 scopus 로고    scopus 로고
    • Caida's Skitter Project Web Page
    • Caida's Skitter Project Web Page, http://www.caida.org/Tools/Skitter/, 2003.
    • (2003)
  • 13
    • 0142098939 scopus 로고    scopus 로고
    • Akamai Technologies Inc.
    • Akamai Technologies Inc., http://www.akamai.com/, 2003.
    • (2003)
  • 14
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under severe denial of service attacks
    • Feb.
    • J. Xu and W. Lee, "Sustaining Availability of Web Services under Severe Denial of Service Attacks," IEEE Trans. Computers, vol. 52, no. 2, Feb. 2003.
    • (2003) IEEE Trans. Computers , vol.52 , Issue.2
    • Xu, J.1    Lee, W.2
  • 15
    • 0004077031 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • IETF RFC 2522, Mar.
    • P. Karn and W. Simpson, "Photuris: Session-Key Management Protocol," IETF RFC 2522, Mar. 1999.
    • (1999)
    • Karn, P.1    Simpson, W.2
  • 16
    • 0003531721 scopus 로고    scopus 로고
    • An analysis of security incidents on the internet
    • PhD thesis, Carnegie Mellon Univ., Aug.
    • J. Howard, "An Analysis of Security Incidents on the Internet," PhD thesis, Carnegie Mellon Univ., Aug. 1998.
    • (1998)
    • Howard, J.1
  • 17
    • 0003659019 scopus 로고    scopus 로고
    • TCP SYN flooding and IP spoofing attacks
    • CERT; Advisory CA-96.21, Sept.
    • CERT, "TCP SYN Flooding and IP Spoofing Attacks," Advisory CA-96.21, Sept. 1996.
    • (1996)
  • 20
    • 84904887582 scopus 로고    scopus 로고
    • TCP SYN flooding attack and the firewall-1 syndefender
    • Checkpoint Inc.
    • Checkpoint Inc., "TCP SYN Flooding Attack and the Firewall-1 Syndefender," http://www.checkpoint.com/products/firewall-1/syndefender.html, 1997.
    • (1997)
  • 24
    • 0003553458 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • RFC 2267, Jan.
    • P. Ferguson, "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," RFC 2267, Jan. 1998.
    • (1998)
    • Ferguson, P.1
  • 25
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DOS attack prevention in power-law internets
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DOS Attack Prevention in Power-Law Internets," Proc. ACM Sigcomm, Aug. 2001.
    • Proc. ACM Sigcomm, Aug. 2001
    • Park, K.1    Lee, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.