메뉴 건너뛰기




Volumn , Issue , 2005, Pages 287-301

Game-based analysis of denial-of-service prevention protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALTERNATING TRANSITION SYSTEM; DENIAL OF SERVICE (DOS) ATTACKS; GAME-BASED ANALYSIS; TEMPORAL LOGIC;

EID: 28144444844     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2005.18     Document Type: Conference Paper
Times cited : (42)

References (47)
  • 1
    • 35048861871 scopus 로고    scopus 로고
    • Just Fast Keying in the Pi calculus
    • M. Abadi, B. Blanchet, and C. Fournet. Just Fast Keying in the Pi calculus. In Proc. ESOP '04, pages 340-354, 2004.
    • (2004) Proc. ESOP '04 , pp. 340-354
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 4
    • 0042908709 scopus 로고    scopus 로고
    • Alternating-time temporal logic
    • R. Alur, T. Henzinger, and O. Kupferman. Alternating-time temporal logic. J. ACM, 49(5):672-713, 2002.
    • (2002) J. ACM , vol.49 , Issue.5 , pp. 672-713
    • Alur, R.1    Henzinger, T.2    Kupferman, O.3
  • 8
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom. Space/time trade-offs in hash coding with allowable errors. CACM, 13(7):422-426, 1970.
    • (1970) CACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 9
    • 4944247375 scopus 로고    scopus 로고
    • Formal analysis of multi-party contract signing
    • R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In Proc. CSFW '04, pages 266-219, 2004.
    • (2004) Proc. CSFW '04 , pp. 266-1219
    • Chadha, R.1    Kremer, S.2    Scedrov, A.3
  • 14
    • 3543119176 scopus 로고    scopus 로고
    • Guaranteeing access in spite of service-flooding attacks
    • V. Gligor. Guaranteeing access in spite of service-flooding attacks. In Proc. Security Protocols Workshop, 2003.
    • (2003) Proc. Security Protocols Workshop
    • Gligor, V.1
  • 15
    • 0347470584 scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • L. Gong and P. Syverson. Fail-stop protocols: an approach to designing secure protocols. In Proc. DCCA '95, pages 44-55, 1995.
    • (1995) Proc. DCCA '95 , pp. 44-55
    • Gong, L.1    Syverson, P.2
  • 18
    • 1242287724 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. In Proc. SIGCOMM '03, pages 99-110, 2003.
    • (2003) Proc. SIGCOMM '03 , pp. 99-110
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 19
    • 0011134472 scopus 로고    scopus 로고
    • Pushback: Router-based defense against DDos attacks
    • J. Ioannidis and S. Bellovin. Pushback: router-based defense against DDos attacks. In Proc. NDSS '02, pages 79-86, 2002.
    • (2002) Proc. NDSS '02 , pp. 79-86
    • Ioannidis, J.1    Bellovin, S.2
  • 20
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion
    • A. Juels and J. Brainard. Client puzzles: a cryptographic defense against connection depletion. In Proc. NDSS '99, pages 151-165, 1999.
    • (1999) Proc. NDSS '99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 21
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
    • S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proc. NSDI, 2005.
    • (2005) Proc. NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 23
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In Proc. CSFW '02, pages 206-220, 2002.
    • (2002) Proc. CSFW '02 , pp. 206-220
    • Kremer, S.1    Raskin, J.-F.2
  • 24
    • 0037937457 scopus 로고    scopus 로고
    • A game-based verification of non-repudiation and fair exchange protocols
    • S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. J. Computer Security, 11(3):399-430, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.3 , pp. 399-430
    • Kremer, S.1    Raskin, J.-F.2
  • 25
    • 28144445427 scopus 로고    scopus 로고
    • Using admissible interference to detect denial of service vulnerabilities
    • S. Lafrance and J. Mullins. Using admissible interference to detect denial of service vulnerabilities. In Proc. IWFM '03, 2003.
    • (2003) Proc. IWFM '03
    • Lafrance, S.1    Mullins, J.2
  • 26
    • 0006013621 scopus 로고    scopus 로고
    • Towards network denial of service resistant protocols
    • J. Leiwo, T. Auro, and P. Nikander. Towards network denial of service resistant protocols. In Proc. SEC '00, pages 301-310, 2000.
    • (2000) Proc. SEC '00 , pp. 301-310
    • Leiwo, J.1    Auro, T.2    Nikander, P.3
  • 27
    • 14344258545 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent
    • P. Liu and W. Zang. Incentive-based modeling and inference of attacker intent. In Proc. CCS '03, pages 179-189, 2003.
    • (2003) Proc. CCS '03 , pp. 179-189
    • Liu, P.1    Zang, W.2
  • 29
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • C. Meadows. A cost-based framework for analysis of denial of service in networks. J. Computer Security, 9(1/2): 143-164, 2001.
    • (2001) J. Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 31
  • 33
  • 34
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proc. SIGCOMM '01, pages 15-26, 2001.
    • (2001) Proc. SIGCOMM '01 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 35
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM CCR, 31(3):38-47, 2001.
    • (2001) ACM CCR , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 36
    • 28144453915 scopus 로고    scopus 로고
    • Analyzing DoS-resistance of protocols using a cost-based framework
    • July
    • V. Ramachandran. Analyzing DoS-resistance of protocols using a cost-based framework. Yale Technical Report YALEU/DCS/TR-1239, July 2002.
    • (2002) Yale Technical Report , vol.YALEU-DCS-TR-1239
    • Ramachandran, V.1
  • 39
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proc. INFOCOM '01, pages 878-886, 2001.
    • (2001) Proc. INFOCOM '01 , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 42
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • H. Wang, D. Zhang, and K. Shin. Detecting SYN flooding attacks. In Proc. INFOCOM '02, pages 1530-1539, 2002.
    • (2002) Proc. INFOCOM '02 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.3
  • 43
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In Proc. IEEE Security and Privacy '03, pages 78-92, 2003.
    • (2003) Proc. IEEE Security and Privacy '03 , pp. 78-92
    • Wang, X.1    Reiter, M.2
  • 44
    • 14844300104 scopus 로고    scopus 로고
    • New client puzzle outsourcing techniques for DoS resistance
    • B. Waters, A. Juels, J. Halderman, and E. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proc. CCS '04, pages 246-256, 2004.
    • (2004) Proc. CCS '04 , pp. 246-256
    • Waters, B.1    Juels, A.2    Halderman, J.3    Felten, E.4
  • 45
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of Web services under distributed denial of service attacks
    • J. Xu and W. Lee. Sustaining availability of Web services under distributed denial of service attacks. IEEE Trans. Computers, 52(2): 195-208, 2003.
    • (2003) IEEE Trans. Computers , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 46
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDos attacks
    • A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDos attacks. In Proc. IEEE Security and Privacy '03, pages 93-109, 2003.
    • (2003) Proc. IEEE Security and Privacy '03 , pp. 93-109
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 47
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless Internet flow filter to mitigate DDos flooding attacks
    • A. Yaar, D. Song, and A. Perrig. SIFF: A stateless Internet flow filter to mitigate DDos flooding attacks. In Proc. IEEE Security and Privacy '04, pages 130-146, 2004.
    • (2004) Proc. IEEE Security and Privacy '04 , pp. 130-146
    • Yaar, A.1    Song, D.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.