메뉴 건너뛰기




Volumn 23, Issue 8, 2004, Pages 665-678

Characterization of defense mechanisms against distributed denial of service attacks

Author keywords

Characterization; Computer network security; Computer security; Defense mechanisms; Distributed denial of service attacks

Indexed keywords

ALGORITHMS; COMPOSITION; COSTS; INFORMATION ANALYSIS; ONLINE SYSTEMS; PUBLIC POLICY; SECURITY OF DATA; STATISTICS;

EID: 10644248262     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.06.008     Document Type: Article
Times cited : (39)

References (50)
  • 1
    • 10644289793 scopus 로고    scopus 로고
    • Arbor. PeakFlow, Waltham, MA: Arbor Networks, Inc.; 2002
    • Arbor. PeakFlow, Waltham, MA: Arbor Networks, Inc.; 2002.
  • 2
    • 10644292084 scopus 로고    scopus 로고
    • Asta. Vantage System, Seattle, WA: Asta Networks, Inc.; 2002
    • Asta. Vantage System, Seattle, WA: Asta Networks, Inc.; 2002.
  • 3
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Department of Computer Engineering, Chalmers University, Goteborg, Sweden March
    • Axelsson S. Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University, Goteborg, Sweden Technical Report 99-15; March 2000.
    • (2000) Technical Report , vol.99 , Issue.15
    • Axelsson, S.1
  • 5
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • New Orleans, LA
    • Burch H, Cheswick B. Tracing anonymous packets to their approximate source. Presented at LINUX System Administration Conference, New Orleans, LA; 2000.
    • (2000) LINUX System Administration Conference
    • Burch, H.1    Cheswick, B.2
  • 7
    • 10644270325 scopus 로고    scopus 로고
    • Pittsburgh, Pennsylvania, USA: CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University; November 2-4
    • CERT/CC. Results of the distributed-systems Intruder tools workshop, Pittsburgh, Pennsylvania, USA: CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University; November 2-4. 1999.
    • (1999) Results of the Distributed-systems Intruder Tools Workshop
  • 11
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion detection systems
    • Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion detection systems. Computer Networks, vol. 31, 1999.
    • (1999) Computer Networks , vol.31
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 13
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • January
    • Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. IETF RFC2267 RFC 2267; January 1998.
    • (1998) IETF RFC2267 RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 14
    • 0003866461 scopus 로고    scopus 로고
    • Packet-level traffic measurement from a Tier-1 IP backbone
    • Sprint ATL, Burlingame, CA
    • Fraleigh C, Moon S, Diot C, Lyles B, Tobagi F. Packet-level traffic measurement from a Tier-1 IP backbone. Sprint ATL, Burlingame, CA Sprint ATL Technical Report TR01-ATL-110101; 2001.
    • (2001) Sprint ATL Technical Report , vol.TR01-ATL-110101
    • Fraleigh, C.1    Moon, S.2    Diot, C.3    Lyles, B.4    Tobagi, F.5
  • 15
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Washington, DC
    • Gil TM, Poletto M. MULTOPS: a data-structure for bandwidth attack detection. Presented at USENIX Security Symposium. Washington, DC; 2001.
    • (2001) USENIX Security Symposium
    • Gil, T.M.1    Poletto, M.2
  • 19
    • 0004601832 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • March
    • Karn P, Simpson W. Photuris: session-key management protocol. IETF RFC 2522; March 1999.
    • (1999) IETF RFC , vol.2522
    • Karn, P.1    Simpson, W.2
  • 21
    • 0004006818 scopus 로고    scopus 로고
    • The IP Security Protocol Working Group, Internet Engineering Task Force
    • Kent S, Atkinson R. IP authentication header. The IP Security Protocol Working Group, Internet Engineering Task Force; 1998b.
    • (1998) IP Authentication Header
    • Kent, S.1    Atkinson, R.2
  • 26
    • 1642283261 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Computer Science Department, University of California, Los Angeles
    • Mirkovic J, Martin J, Reiher P. A taxonomy of DDoS attacks and DDoS defense mechanisms. Computer Science Department, University of California, Los Angeles Technical report #020018; 2002a.
    • (2002) Technical Report #020018
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 29
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. Presented at Proceedings of IEEE INFOCOM; 2001 a.
    • (2001) Proceedings of IEEE INFOCOM
    • Park, K.1    Lee, H.2
  • 30
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet
    • San Diego, CA
    • Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. Presented at ACM SIGCOMM'01. San Diego, CA; 2001 b.
    • (2001) ACM SIGCOMM'01
    • Park, K.1    Lee, H.2
  • 31
    • 0002990537 scopus 로고    scopus 로고
    • End-to-end routing behavior in the Internet
    • Paxson V. End-to-end routing behavior in the Internet. Presented at ACM SIGCOMM '96; 1996.
    • (1996) ACM SIGCOMM '96
    • Paxson, V.1
  • 32
    • 10644256048 scopus 로고    scopus 로고
    • Recourse. ManHunt, Redwood City, CA: Recourse Technologies, Inc; 2002
    • Recourse. ManHunt, Redwood City, CA: Recourse Technologies, Inc; 2002.
  • 38
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Song DX, Perrig A. Advanced and authenticated marking schemes for IP traceback. Presented at IEEE Inforcom; 2001.
    • (2001) IEEE Inforcom
    • Song, D.X.1    Perrig, A.2
  • 43
    • 84904907549 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: A novel technique for detecting against Internet DDos attacks
    • Sung M, Xu J. IP traceback-based intelligent packet filtering: a novel technique for detecting against Internet DDos attacks. Presented at IEEE International Conference on Network Protocols; 2002.
    • (2002) IEEE International Conference on Network Protocols
    • Sung, M.1    Xu, J.2
  • 44
    • 10644255179 scopus 로고    scopus 로고
    • Hackers attack major Internet sites, temporarily shutting Buy.com, Ebay
    • Tran KTL. Hackers attack major Internet sites, temporarily shutting Buy.com, Ebay. Wall Street Journal 2000:3.
    • (2000) Wall Street Journal , vol.3
    • Ktl, T.1
  • 48


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.