메뉴 건너뛰기




Volumn 16, Issue 6, 2005, Pages 526-537

Perimeter-based defense against high bandwidth DDoS attacks

Author keywords

Network level security and protection

Indexed keywords

BANDWIDTH; COMPUTER SIMULATION; ELECTRIC FILTERS; NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; THEOREM PROVING;

EID: 21244446746     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2005.74     Document Type: Article
Times cited : (70)

References (21)
  • 2
    • 3042859154 scopus 로고    scopus 로고
    • "Resisting SYN Flood DoS Attacks with a SYN Cache"
    • Proc. USENIX BSDCON 2002, Feb
    • J. Lemon, "Resisting SYN Flood DoS Attacks with a SYN Cache," Proc. USENIX BSDCON 2002, Feb. 2002.
    • (2002)
    • Lemon, J.1
  • 4
    • 85084161486 scopus 로고    scopus 로고
    • "Inferring Internet Denial of Service Activity"
    • Proc. USENIX Security Symp. 2001, Aug
    • D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial of Service Activity," Proc. USENIX Security Symp. 2001, Aug. 2001.
    • (2001)
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 5
    • 0003336855 scopus 로고    scopus 로고
    • "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing"
    • Jan
    • P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," IETF, RFC 2267, Jan. 1998.
    • (1998) IETF, RFC 2267
    • Ferguson, P.1    Senie, D.2
  • 6
    • 0001083965 scopus 로고    scopus 로고
    • "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets"
    • Proc. ACM SIGCOMM 2001, Aug
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM 2001, Aug. 2001.
    • (2001)
    • Park, K.1    Lee, H.2
  • 7
    • 24344451222 scopus 로고    scopus 로고
    • "Tracing Anonymous Packets to Their Approximate Source"
    • Proc. USENIX LISA '00, Dec
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source," Proc. USENIX LISA '00, Dec. 2000.
    • (2000)
    • Burch, H.1    Cheswick, B.2
  • 9
    • 85084163540 scopus 로고    scopus 로고
    • "CenterTrack: An IP Overlay Network for Tracking DoS Floods"
    • Proc. USENIX Security Symp. '00, Aug
    • R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. USENIX Security Symp. '00, Aug. 2000.
    • (2000)
    • Stone, R.1
  • 10
    • 0005076592 scopus 로고    scopus 로고
    • "Practical Network Support for IP Traceback"
    • Proc. ACM SIGCOMM 2000, Aug
    • S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical Network Support for IP Traceback," Proc. ACM SIGCOMM 2000, Aug. 2000.
    • (2000)
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 11
    • 0034997397 scopus 로고    scopus 로고
    • "Advanced and Authenticated Marking Schemes for IP Traceback"
    • Proc. IEEE INFOCOM 2001, Mar
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM 2001, Mar. 2001.
    • (2001)
    • Song, D.1    Perrig, A.2
  • 13
    • 0035010963 scopus 로고    scopus 로고
    • "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attacks"
    • Proc. IEEE INFOCOM 2001, Mar
    • K. Park and H. Lee, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attacks," Proc. IEEE INFOCOM 2001, Mar. 2001.
    • (2001)
    • Park, K.1    Lee, H.2
  • 14
    • 84904907549 scopus 로고    scopus 로고
    • "IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks"
    • Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP 2002), Nov
    • M. Song and J. Xu, "IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP 2002), Nov. 2002.
    • (2002)
    • Song, M.1    Xu, J.2
  • 16
    • 84954422497 scopus 로고    scopus 로고
    • "Pi: A Path Identification Mechanism to Defend against DDoS Attacks"
    • Proc. IEEE Symp. Security and Privacy, May
    • A. Yaar, A. Perrig, and D. Song, "Pi: A Path Identification Mechanism to Defend against DDoS Attacks," Proc. IEEE Symp. Security and Privacy, May 2003.
    • (2003)
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 17
    • 0004194675 scopus 로고    scopus 로고
    • "ICMP Traceback Messages"
    • Internet Draft: Draft-bellovin-itrace-00.txt, Mar
    • S.M. Bellovin, "ICMP Traceback Messages," Internet Draft: draft-bellovin-itrace-00.txt, Mar. 2000.
    • (2000)
    • Bellovin, S.M.1
  • 18
    • 0003473435 scopus 로고    scopus 로고
    • "The Strange Tale of the Denial of Service Attacks against GRC.COM"
    • S. Gibson, "The Strange Tale of the Denial of Service Attacks against GRC.COM," http://grc.com/dos/grcdos.htm, 2002.
    • (2002)
    • Gibson, S.1
  • 19
    • 21244441789 scopus 로고    scopus 로고
    • "SYN Cookies, An Exploration"
    • G.W. Gordon, "SYN Cookies, An Exploration," http://www.giac.org/ practical/Gerald_Gordon_GSEC.doc, 2005.
    • (2005)
    • Gordon, G.W.1
  • 20
    • 21244469720 scopus 로고    scopus 로고
    • "SOS: Secure Overlay Services"
    • Proc. ACM SIGCOMM 2002, Aug
    • A.D. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure Overlay Services," Proc. ACM SIGCOMM 2002, Aug. 2002.
    • (2002)
    • Keromytis, A.D.1    Misra, V.2    Rubenstein, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.