메뉴 건너뛰기




Volumn 16, Issue 9, 2005, Pages 799-813

You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers

Author keywords

Attack traffic filtering; DDoS attack; Minimum stable time; Traceback

Indexed keywords

COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; PACKET NETWORKS; ROUTERS; STATISTICAL METHODS; TELECOMMUNICATION TRAFFIC; WEBSITES;

EID: 25844469597     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2005.114     Document Type: Article
Times cited : (52)

References (22)
  • 1
    • 25844506602 scopus 로고    scopus 로고
    • Internet scanning database
    • Internet scanning database, http://cin.bell-labs.cont/whoiches/map/dbs/ index.html, 1999.
    • (1999)
  • 2
    • 2442446610 scopus 로고    scopus 로고
    • "Computer Emergency Response Team Cert Advisory ca-2000-01. Denial-Of-Service Developments"
    • "Computer Emergency Response Team, Cert Advisory ca-2000-01. Denial-of-Service Developments," http://www.cert.org/advisories/ ca-2000-01.html, 2000,
    • (2000)
  • 3
    • 0002738343 scopus 로고
    • "Secukity Problems in the TCP/IP Protocol Suite"
    • S. Bellowin, "Secukity Problems in the TCP/IP Protocol Suite," Computer Comm. Rev., pp. 32-48, 1989.
    • (1989) Computer Comm. Rev. , pp. 32-48
    • Bellowin, S.1
  • 4
    • 85011016678 scopus 로고    scopus 로고
    • "Tracing Anonymous Packets to their Approximate Source"
    • Dec.
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to their Approximate Source," Usenix LISA, Dec. 2000.
    • (2000) Usenix LISA
    • Burch, H.1    Cheswick, B.2
  • 7
    • 0003553457 scopus 로고    scopus 로고
    • "RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing"
    • The Internet Society, Jan.
    • P. Ferguson and D. Senie, "RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing," The Internet Society, Jan. 1998.
    • (1998)
    • Ferguson, P.1    Senie, D.2
  • 8
    • 0003531721 scopus 로고    scopus 로고
    • "An Analysis of Security Incidents on the Internet"
    • PhD Thesis, Carnegie Mellon Univ., Aug.
    • J. Howard, "An Analysis of Security Incidents on the Internet," PhD Thesis, Carnegie Mellon Univ., Aug. 1998.
    • (1998)
    • Howard, J.1
  • 9
    • 25844487708 scopus 로고    scopus 로고
    • "You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDOS Attackers"
    • Technical Report CS-TR-2002-06, Computer Science Eng. Dept., Chinese Univ. Hong Kong
    • K.T. Law, J.C.S. Lui, and D.K.Y. Yau, "You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDOS Attackers," Technical Report CS-TR-2002-06, Computer Science Eng. Dept., Chinese Univ. Hong Kong, 2002.
    • (2002)
    • Law, K.T.1    Lui, J.C.S.2    Yau, D.K.Y.3
  • 12
  • 17
    • 0034997397 scopus 로고    scopus 로고
    • "Advanced and Authenticated Marking Schemes for IP Traceback"
    • Apr.
    • D.X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM Conf., Apr. 2001.
    • (2001) Proc. IEEE INFOCOM Conf.
    • Song, D.X.1    Perrig, A.2
  • 18
    • 0004194675 scopus 로고    scopus 로고
    • "ICMP Traceback Messages"
    • draft-bellovin-itrace-00.txt, Mar.
    • E. Steven and M. Bellovin, "ICMP Traceback Messages," draft-bellovin-itrace-00.txt, Mar. 2000.
    • (2000)
    • Steven, E.1    Bellovin, M.2
  • 19
    • 85084163540 scopus 로고    scopus 로고
    • "Centertrack: An IP Overlay Network for Tracking DOS Floods"
    • Aug.
    • R. Stone, "Centertrack: An IP Overlay Network for Tracking DOS Floods," Proc. Ninth LISENIX Security Symp., Aug. 2000.
    • (2000) Proc. Ninth LISENIX Security Symp.
    • Stone, R.1
  • 20
    • 25844524821 scopus 로고    scopus 로고
    • "Intention-Driven ICMP Trace-Back, Internet Draft"
    • draft-wu-itrace-intention-00.txt, Feb.
    • S.F. Wu, L. Zhang, D. Massey, and A. Mankin, "Intention-Driven ICMP Trace-Back, Internet Draft," draft-wu-itrace-intention-00.txt, Feb. 2001.
    • (2001)
    • Wu, S.F.1    Zhang, L.2    Massey, D.3    Mankin, A.4
  • 21
    • 0038404196 scopus 로고    scopus 로고
    • "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles"
    • May
    • D.K.Y. Yau, J.C.S. Lui, and F. Liang, "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," Proc. IEEE Int'l Workshop Quality of Service (IWQoS), May 2002.
    • (2002) Proc. IEEE Int'l Workshop Quality of Service (IWQoS)
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.