메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 621-626

Mitigating denial of service attacks with password puzzles

Author keywords

[No Author keywords available]

Indexed keywords

GAME THEORY; INTERNET; NETWORK PROTOCOLS; QUALITY OF SERVICE;

EID: 24744468386     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/itcc.2005.200     Document Type: Conference Paper
Times cited : (18)

References (33)
  • 2
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," Proceedings of IEEE INFOCOM, 2001, pp. 878-886.
    • (2001) Proceedings of IEEE INFOCOM , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 4
    • 0002624024 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • New Orleans, U.S.A., Dec.
    • Hal Burch and Bill Cheswick, "Tracing anonymous packets to their approximate source," 14th Systems Administration Conference, New Orleans, U.S.A., Dec. 2000, pp. 313-322.
    • (2000) 14th Systems Administration Conference , pp. 313-322
    • Burch, H.1    Cheswick, B.2
  • 5
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoS floods
    • August
    • Robert Stone, "CenterTrack: an IP overlay network for tracking DoS floods," 9th USENIX Security Symposium, August 2000.
    • (2000) 9th USENIX Security Symposium
    • Stone, R.1
  • 6
    • 8344278876 scopus 로고    scopus 로고
    • ICMP traceback messages
    • March
    • Steven M. Bellovin, "ICMP Traceback messages," Internet Draft, March 2001.
    • (2001) Internet Draft
    • Bellovin, S.M.1
  • 9
    • 3543126644 scopus 로고    scopus 로고
    • Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation
    • Berkeley, California, U.S.A
    • J. Li, M. Sung, J. Xu and L. Li, "Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 115-129.
    • (2004) IEEE Symposium on Security and Privacy (S&P) , pp. 115-129
    • Li, J.1    Sung, M.2    Xu, J.3    Li, L.4
  • 10
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • D. Senie, "Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing," RFC 2827, 5 2000.
    • (2000) RFC , vol.2827 , Issue.5
    • Senie, D.1
  • 13
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for Internet services
    • D. Andersen, "Mayday: distributed filtering for Internet services," Proceedings of USITS, 2003.
    • (2003) Proceedings of USITS
    • Andersen, D.1
  • 14
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • Berkeley, California, U.S.A.
    • A. Yaar, A. Perrig and D. Song, "Pi: a path identification mechanism to defend against DDoS attacks," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, U.S.A., pp. 93-107.
    • (2003) IEEE Symposium on Security and Privacy (S&P) , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 15
    • 3543059601 scopus 로고    scopus 로고
    • StackPi: A new defensive mechnamism against IP spoofing and DDoS attacks
    • Carnegie Mellon University, February
    • A. Perrig, D. Song and A. Yaar, "StackPi: a new defensive mechnamism against IP spoofing and DDoS attacks," Technical Report CMU-CS-02-208, Carnegie Mellon University, February 2003.
    • (2003) Technical Report , vol.CMU-CS-02-208
    • Perrig, A.1    Song, D.2    Yaar, A.3
  • 16
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed DDoS traffic
    • October 27-31, 2003, Washington, DC, USA
    • C. Jin, H. Wang and K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic," 10th ACM Conference on Computer and Communications Security (CCS) 2003, October 27-31, 2003, Washington, DC, USA, pp.30-41.
    • (2003) 10th ACM Conference on Computer and Communications Security (CCS) , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 17
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistics-based overload control against distributed denialof-service attacks
    • Y. Kim, W. Ch. Lau, M. C. Chuah, H. J. Chao. "PacketScore: Statistics-based overload control against distributed denialof-service attacks", Proceedings of IEEE INFOCOM 2004.
    • (2004) Proceedings of IEEE INFOCOM
    • Kim, Y.1    Lau, W.Ch.2    Chuah, M.C.3    Chao, H.J.4
  • 18
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
    • Berkeley, California, U.S.A
    • A. Yaar, A. Perrig and D. Song, "SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks." IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 130-143.
    • (2004) IEEE Symposium on Security and Privacy (S&P) , pp. 130-143
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 19
    • 3543057677 scopus 로고    scopus 로고
    • An empirical analysis of target-resident DoS filters
    • Berkeley, California, U.S.A
    • M. Collins and M. K. Reiter, "An empirical analysis of target-resident DoS filters," IEEE symposium on security and privacy (S&P) 2004, Berkeley, California, U.S.A, pp. 103-114.
    • (2004) IEEE Symposium on Security and Privacy (S&P) , pp. 103-114
    • Collins, M.1    Reiter, M.K.2
  • 21
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denialof-service attacks with puzzle auctions
    • Berkeley, California, U.S.A.
    • X. F. Wang and M. K. Reiter, "Defending against denialof-service attacks with puzzle auctions," IEEE symposium on security and privacy (S&P) 2003, Berkeley, California, U.S.A., pp. 78-92.
    • (2003) IEEE Symposium on Security and Privacy (S&P) , pp. 78-92
    • Wang, X.F.1    Reiter, M.K.2
  • 30
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM 24(11), Nov. 1981, pp. 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 33
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial-of-service with capabilites
    • ACM Press
    • T. Anderson, T. Roscoe and D. Wetherall, "Preventing Internet denial-of-service with capabilites," HotNets-II. ACM Press, 2003.
    • (2003) HotNets-II
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.