메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 328-337

Roaming honeypots for mitigating service-level denial-of-service attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; INTERNET; PACKET NETWORKS; SERVERS; SWITCHES; TELECOMMUNICATION TRAFFIC;

EID: 2442597231     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcs.2004.1281598     Document Type: Conference Paper
Times cited : (54)

References (37)
  • 1
    • 84862368630 scopus 로고    scopus 로고
    • Akamai Corporation, http://www.akamai.com.
  • 3
    • 84862364555 scopus 로고    scopus 로고
    • NetSec Group. http://www.cs.pitt.edu/NETSEC.
  • 4
    • 84862364554 scopus 로고    scopus 로고
    • Snort, http://www.snort.com.
  • 6
    • 4143130116 scopus 로고    scopus 로고
    • CERT. Denial of Service Attacks. http://www.cert.org/tech_tips/ denial_of_service.html, 1997.
    • (1997) Denial of Service Attacks
  • 9
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • May
    • P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. In RFC 2827, May 2001.
    • (2001) RFC 2827
    • Ferguson, P.1    Senie, D.2
  • 11
    • 2442631684 scopus 로고    scopus 로고
    • Distributed denial of service attacks: Defenses, a special publication
    • Global Integrity
    • J. Jones. Distributed Denial of Service Attacks: Defenses, A Special Publication. Technical report, Global Integrity, 2000.
    • (2000) Technical Report
    • Jones, J.1
  • 12
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In Proceedings of NDSS'99.
    • Proceedings of NDSS'99
    • Juels, A.1    Brainard, J.2
  • 15
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks. (The shrew vs. The mice and elephants)
    • A. Kuzmanovic and E. W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks. (The Shrew vs. the Mice and Elephants). In ACM SIGCOMM 2003.
    • ACM SIGCOMM 2003
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 18
    • 1642283261 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Computer Science Department, University of California, Los Angeles
    • J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report 020018, Computer Science Department, University of California, Los Angeles, 2002.
    • (2002) Technical Report 020018
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 20
    • 0003804730 scopus 로고
    • A weakness in the 4.2BSD unix TCP/IP software
    • AT&T Bell Labs Computer Science
    • R. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report 117, AT&T Bell Labs Computer Science, 1985.
    • (1985) Technical Report , vol.117
    • Morris, R.1
  • 21
    • 0141760371 scopus 로고    scopus 로고
    • Defending against distributed denial of service attack using selective pushback
    • T. Peng, C. Leckie, and K. Ramamohanarao. Defending against distributed denial of service attack using selective pushback. In Proceedings of ICT 2002.
    • Proceedings of ICT 2002
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 22
    • 0012109964 scopus 로고    scopus 로고
    • Addison-Wisley, Indianapolis, IN
    • T. H. Project. Know Your Enemy. Addison-Wisley, Indianapolis, IN, 2002.
    • (2002) Know Your Enemy
    • Project, T.H.1
  • 23
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • R. Rivest. The MD5 message-digest algorithm. In RFC 1321, 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 24
    • 84979076059 scopus 로고    scopus 로고
    • PayWord and MicroMint-two simple micropayment schemes
    • M. Lomas, editor, number 1189 in Lecture Notes in Computer Science. Springer
    • R. L. Rivest and A. Shamir. PayWord and MicroMint-Two Simple Micropayment Schemes. In M. Lomas, editor, Proceedings of 1996 International Workshop on Security Protocols, number 1189 in Lecture Notes in Computer Science, pages 69-87. Springer, 1996.
    • (1996) Proceedings of 1996 International Workshop on Security Protocols , pp. 69-87
    • Rivest, R.L.1    Shamir, A.2
  • 33
    • 84903755100 scopus 로고    scopus 로고
    • Honeypots for distributed denial-of-service attacks
    • N. Weiler. Honeypots for distributed denial-of-service attacks. In Proceedings of WET ICE 2002.
    • Proceedings of WET ICE 2002
    • Weiler, N.1
  • 36
    • 70349522709 scopus 로고    scopus 로고
    • The XenoService - A distributed defeat for distributed denial of service
    • J. Yan, S. Early, and R. Anderson. The XenoService - A Distributed Defeat for Distributed Denial of Service. In Proceedings of ISW 2000.
    • Proceedings of ISW 2000
    • Yan, J.1    Early, S.2    Anderson, R.3
  • 37
    • 0003515999 scopus 로고    scopus 로고
    • COCA: A secure distributed on-line certification authority
    • Department of Computer Science, Cornell University, Ithaca, NY USA
    • L. Zhou, F. Schneider, and R. van Renesse. COCA: A Secure Distributed On-line Certification Authority. Technical report, Department of Computer Science, Cornell University, Ithaca, NY USA, 2000.
    • (2000) Technical Report
    • Zhou, L.1    Schneider, F.2    Van Renesse, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.