메뉴 건너뛰기




Volumn , Issue , 2004, Pages 257-267

Mitigating bandwidth-exhaustion attacks using congestion puzzles

Author keywords

Client puzzle; Denial of service

Indexed keywords

BANDWIDTH; COMPUTER CRIME; CONGESTION CONTROL (COMMUNICATION); INTERNET; NETWORK PROTOCOLS; ROUTERS; SERVERS;

EID: 14844334596     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030118     Document Type: Conference Paper
Times cited : (63)

References (40)
  • 8
    • 8344278876 scopus 로고    scopus 로고
    • The ICMP traceback messages
    • Draft-ietf-itrace-01.txt, December
    • S. Bellovin, M. Leech, and T. Taylor. The ICMP traceback messages. In Internet-Draft, draft-ietf-itrace-01.txt, December 1999. ftp://ftp.ietf.org/ internet-drafts/draft-ietf-itrace-01.txt.
    • (1999) Internet-Draft
    • Bellovin, S.1    Leech, M.2    Taylor, T.3
  • 9
    • 0003794137 scopus 로고
    • Prentice-Hall, Englewood-Cliffs, New Jersey, USA
    • D. Bertsekas and R. Gallager. Data Networks, Prentice-Hall, Englewood-Cliffs, New Jersey, USA, 1992.
    • (1992) Data Networks
    • Bertsekas, D.1    Gallager, R.2
  • 10
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13(7):422-426, 1970.
    • (1970) Communications of ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 12
    • 14844335598 scopus 로고    scopus 로고
    • Caida. Skitter. 2003. http://www.caida.org/tools/measurement/skitter.
    • (2003)
  • 18
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the internet
    • August
    • S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Transactions on Networking, August 1999.
    • (1999) IEEE/ACM Transactions on Networking
    • Floyd, S.1    Fall, K.2
  • 19
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • July - August
    • X. Geng and A. Whinston. Defeating distributed denial of service attacks. IEEE IT Professional, 2(4):36-41, July - August 2000.
    • (2000) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-41
    • Geng, X.1    Whinston, A.2
  • 20
    • 3543119176 scopus 로고    scopus 로고
    • Guaranteeing access in spite of service-flooding attack
    • R. Hirschfeld, editor, Lecture Notes in Computer Science. Springer-Verlag
    • V. Gligor. Guaranteeing access in spite of service-flooding attack. In R. Hirschfeld, editor, Proceedings of the Security Protocols Workshop, Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Proceedings of the Security Protocols Workshop
    • Gligor, V.1
  • 22
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed traffic
    • C. Jin, H. Wang, and K. Shin. Hop-count filtering: An effective defense against spoofed traffic. In Proceedings of ACM CCS, 2003.
    • (2003) Proceedings of ACM CCS
    • Jin, C.1    Wang, H.2    Shin, K.3
  • 23
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In S.Kent, editor, Proceedings of NDSS'99, pages 151-165, 1999.
    • (1999) S.Kent, Editor, Proceedings of NDSS'99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 26
    • 0035703761 scopus 로고    scopus 로고
    • Controlling high-bandwidth flows at the congested router
    • November
    • R. Mahajan, S. Floyd, and D. Wetherall. Controlling high-bandwidth flows at the congested router. In Proceedings of ICNP, November 2001.
    • (2001) Proceedings of ICNP
    • Mahajan, R.1    Floyd, S.2    Wetherall, D.3
  • 34
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip traceback
    • April
    • D. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In Proceedings of IEEE INFOCOMM, April 2001.
    • (2001) Proceedings of IEEE INFOCOMM
    • Song, D.1    Perrig, A.2
  • 35
    • 0002709112 scopus 로고    scopus 로고
    • Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
    • I. Stoca, S. Shenker, and H. Zhang. Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks. In Proceedings of ACM SIGCOMM, 1998.
    • (1998) Proceedings of ACM SIGCOMM
    • Stoca, I.1    Shenker, S.2    Zhang, H.3
  • 38
    • 84954449334 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • May
    • X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, May 2003.
    • (2003) IEEE Symposium on Security and Privacy
    • Wang, X.1    Reiter, M.2
  • 39
    • 84954422497 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • May
    • A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDoS attacks. In IEEE Symposium on Security and Privacy, May 2003. http://www.ece.cmu.edu/~adrian/projects/pi.ps.
    • (2003) IEEE Symposium on Security and Privacy
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.