메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1353-1357

An Efficient Filter for Denial-of-Service Bandwidth Attacks

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; COMPUTATIONAL METHODS; COMPUTER CRIME; COST EFFECTIVENESS; HEURISTIC METHODS; NETWORK PROTOCOLS; PACKET NETWORKS; PROBLEM SOLVING; ROUTERS;

EID: 0842332412     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (60)

References (13)
  • 1
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. Bloom. "Space/time trade-offs in hash coding with allowable errors." In Communications of the ACM, Vol. 13 No. 7, July 1970, pp. 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 2
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • Oct
    • R. Chang. "Defending against flooding-based distributed denial-of-service attacks: a tutorial." In IEEE Communications Magazine, Vol. 40 No. 10, Oct 2002, pp. 42-51.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.1
  • 3
    • 0003334329 scopus 로고    scopus 로고
    • Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
    • May
    • P. Ferguson and D. Senie. "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing." RFC2827, May 2000, http://www.ietf.org/rfc/rfc2827.txt.
    • (2000) RFC , vol.2827
    • Ferguson, P.1    Senie, D.2
  • 4
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • April
    • L. Garber. "Denial-of-service attacks rip the internet." In IEEE Computer, Vol. 33 No. 4, April 2000, pp. 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 5
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • August, Washington D.C., USA
    • T. Gil and M. Poletto. "MULTOPS: a data-structure for bandwidth attack detection." In Proceedings of the 10th USENIX Security Symposium, August 2001, Washington D.C., USA.
    • (2001) Proceedings of the 10th USENIX Security Symposium
    • Gil, T.1    Poletto, M.2
  • 9
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • April, Anchorage, Alaska, USA
    • K. Park and H. Lee. "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack." In Proceedings of IEEE INFOCOM 2001, April 2001, Anchorage, Alaska, USA, Vol. 1, pp. 338-347.
    • (2001) Proceedings of IEEE INFOCOM 2001 , vol.1 , pp. 338-347
    • Park, K.1    Lee, H.2
  • 11
    • 0038729330 scopus 로고    scopus 로고
    • Protection from Distributed Denial of Service Attack Using History-based IP Filtering
    • 11-15 May, Anchorage, Alaska, USA
    • T. Peng, C. Leckie and R. Kotagiri. "Protection from Distributed Denial of Service Attack Using History-based IP Filtering." To appear in the IEEE International Conference on Communications (ICC 2003), 11-15 May 2003, Anchorage, Alaska, USA.
    • (2003) IEEE International Conference on Communications (ICC 2003)
    • Peng, T.1    Leckie, C.2    Kotagiri, R.3
  • 13
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • April, Anchorage, Alaska, USA
    • D. Song and A. Perrig. "Advanced and authenticated marking schemes for IP traceback." In Proceedings of IEEE INFOCOM 2001, April 2001, Anchorage, Alaska, USA, Vol. 2, pp. 878-886.
    • (2001) Proceedings of IEEE INFOCOM 2001 , vol.2 , pp. 878-886
    • Song, D.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.