메뉴 건너뛰기




Volumn 48, Issue 5, 2005, Pages 781-807

WebSOS: An overlay-based system for protecting web servers from denial of service attacks

Author keywords

Denial of service; Graphic Turing Tests; Java; Network topology; Overlay networks; Reliability; Security; Security and protection; Web proxies

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; HUMAN COMPUTER INTERACTION; JAVA PROGRAMMING LANGUAGE; RELIABILITY; SECURITY OF DATA; SERVERS; TURING MACHINES; USER INTERFACES;

EID: 18844457631     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.01.005     Document Type: Article
Times cited : (46)

References (77)
  • 11
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • IETF, November
    • S. Kent, R. Atkinson, Security architecture for the Internet protocol, RFC 2401, IETF, November 1998. URL available from: < ftp://ftp.isi.edu/in- notes/rfc2401.txt >
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 16
    • 0030704545 scopus 로고    scopus 로고
    • Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web
    • citeseer.nj.nec.com/karger97consistent.html
    • D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, D. Lewin, Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web, in: Proceedings of ACM Symposium on Theory of Computing (STOC), 1997, pp. 654-663. URL available from: < citeseer.nj.nec.com/karger97consistent.html >
    • (1997) Proceedings of ACM Symposium on Theory of Computing (STOC) , pp. 654-663
    • Karger, D.1    Lehman, E.2    Leighton, F.3    Panigrahy, R.4    Levine, M.5    Lewin, D.6
  • 20
  • 21
    • 0003252383 scopus 로고    scopus 로고
    • Generic routing encapsulation (GRE)
    • IETF, March
    • D. Farinacci, T. Li, S. Hanks, D. Meyer, P. Traina, Generic routing encapsulation (GRE), RFC 2784, IETF, March 2000. URL available from: < http://www.rfc-editor.org/rfc/rfc2784.txt >
    • (2000) RFC , vol.2784
    • Farinacci, D.1    Li, T.2    Hanks, S.3    Meyer, D.4    Traina, P.5
  • 22
    • 0007690307 scopus 로고    scopus 로고
    • Key and sequence number extensions to GRE
    • IETF, September 2000
    • G. Dommety, Key and sequence number extensions to GRE, RFC 2890, IETF, September 2000. URL available from: < http://www.rfc-editor.org/rfc/rfc2890. txt >
    • RFC , vol.2890
    • Dommety, G.1
  • 25
    • 0003218499 scopus 로고    scopus 로고
    • PPP extensible authentication protocol (EAP)
    • IETF, March
    • J.V.L. Blunk, PPP extensible authentication protocol (EAP), RFC 2284, IETF, March 1998. URL available from: < http://www.ietf.org/rfc/rfc2284.txt >
    • (1998) RFC , vol.2284
    • Blunk, J.V.L.1
  • 27
    • 85084162787 scopus 로고    scopus 로고
    • Authorization and charging in public lawns using freebased and 802.1x
    • Freenix Track
    • P. Nikander, Authorization and charging in public lawns using freebased and 802.1x, in: Proceedings of the Annual USENIX Technical Conference, Freenix Track, 2002
    • (2002) Proceedings of the Annual USENIX Technical Conference
    • Nikander, P.1
  • 29
    • 18644386802 scopus 로고    scopus 로고
    • Analysis of routing algorithms for secure overlay service
    • Columbia University, April
    • D. Cook, Analysis of Routing Algorithms for Secure Overlay Service, Computer Science Department Technical Report CUCS-010-02, Columbia University, April 2002. URL available from: < http://www.cs.columbia.edu/~library/TR- repository/reports/reports-2002/cucs-010-02.pdf >
    • (2002) Computer Science Department Technical Report , vol.CUCS-010-02
    • Cook, D.1
  • 31
    • 45849108185 scopus 로고    scopus 로고
    • On the performance of TCP splicing for URLAware redirection
    • citeseer.nj.nec.com/cohen99performance.html
    • A. Cohen, S. Rangarajan, J.H. Slye, On the performance of TCP splicing for URLAware redirection, in: USENIX Symposium on Internet Technologies and Systems, 1999. URL available from: < citeseer.nj.nec.com/cohen99performance. html >
    • (1999) USENIX Symposium on Internet Technologies and Systems
    • Cohen, A.1    Rangarajan, S.2    Slye, J.H.3
  • 48
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
    • K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets, in: Proceedings of ACM SIGCOMM, 2001, pp. 15-26
    • (2001) Proceedings of ACM SIGCOMM , pp. 15-26
    • Park, K.1    Lee, H.2
  • 57
    • 34250620174 scopus 로고    scopus 로고
    • NetBouncer: Client-legitimacy-based high-performance DDoS filtering
    • R. Thomas, B. Mark, T. Johnson, J. Croall, NetBouncer: client-legitimacy-based high-performance DDoS filtering, in: Proceedings of DISCEX III, 2003, pp. 14-25
    • (2003) Proceedings of DISCEX III , pp. 14-25
    • Thomas, R.1    Mark, B.2    Johnson, T.3    Croall, J.4
  • 63
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • D. Chaum Achieving electronic privacy Scientific American 1992 96 101
    • (1992) Scientific American , pp. 96-101
    • Chaum, D.1
  • 71
    • 0001797564 scopus 로고    scopus 로고
    • PayWord and MicroMint
    • R. Rivest, and A. Shamir PayWord and MicroMint CryptoBytes 2 1 1996 7 11
    • (1996) CryptoBytes , vol.2 , Issue.1 , pp. 7-11
    • Rivest, R.1    Shamir, A.2
  • 73
    • 35048889161 scopus 로고    scopus 로고
    • Safeguarding digital library contents
    • A. Herzberg, Safeguarding Digital Library Contents, D-Lib Magazine
    • D-Lib Magazine
    • Herzberg, A.1
  • 74
    • 85051038557 scopus 로고
    • Requirements for network payment: The Netcheque prospective
    • C. Neuman, G. Medvinsky, Requirements for network payment: The Netcheque prospective, in: Proceedings of IEEE COMCON, 1995
    • (1995) Proceedings of IEEE COMCON
    • Neuman, C.1    Medvinsky, G.2
  • 76
    • 84958042278 scopus 로고    scopus 로고
    • A payment scheme using vouchers
    • Proceedings of the Second International Conference on Financial Cryptography, Springer-Verlag
    • E. Foo, and C. Boyd A payment scheme using vouchers Proceedings of the Second International Conference on Financial Cryptography Lecture Notes in Computer Science vol. 1465 1998 Springer-Verlag 103 121
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 103-121
    • Foo, E.1    Boyd, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.