메뉴 건너뛰기




Volumn 13, Issue 6, 2005, Pages 807-837

Mitigating denial of service attacks: A tutorial

Author keywords

Attack mechanisms; Defense mechanisms; Denial of service; Network security

Indexed keywords

COMPUTER SYSTEMS; MECHANISMS; OPTIMIZATION; RISK MANAGEMENT; RISKS; SECURITY OF DATA;

EID: 29244465140     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13601     Document Type: Article
Times cited : (32)

References (65)
  • 1
    • 25744465894 scopus 로고    scopus 로고
    • Towards a more functional and secure network infrastructure
    • University of California, Berkeley
    • D. Adkins, K. Lakshminarayanan, A. Perrig and I. Stoica, Towards a more functional and secure network infrastructure, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1242, 2003.
    • (2003) Tech. Rep. , vol.UCB-CSD-03-1242
    • Adkins, D.1    Lakshminarayanan, K.2    Perrig, A.3    Stoica, I.4
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Carnegie Mellon University, Software Engineering Institute, Jan. [Online]
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner, State of the practice of intrusion detection technologies, Carnegie Mellon University, Software Engineering Institute, Tech. Rep. CMU/SEI-99-TR-028, Jan. 2000. [Online] Available: http://www.cert.org/archive/pdf/99tr028.pdf.
    • (2000) Tech. Rep. , vol.CMU-SEI-99-TR-028
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 3
    • 3042742908 scopus 로고    scopus 로고
    • An analysis of the Slapper worm
    • I. Arce and E. Levy, An analysis of the Slapper worm, IEEE Security & Privacy 1(1) (2003), 82-87.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 82-87
    • Arce, I.1    Levy, E.2
  • 5
    • 12544260240 scopus 로고    scopus 로고
    • Format string vulnerability
    • Hacker Emergency Response Team, July
    • P. Bouchareine, Format string vulnerability, Hacker Emergency Response Team, Tech. Rep., July 2000.
    • (2000) Tech. Rep.
    • Bouchareine, P.1
  • 6
    • 0032154023 scopus 로고    scopus 로고
    • Detecting disruptive routers: A distributed network monitoring approach
    • K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee and R.A. Olsson, Detecting disruptive routers: A distributed network monitoring approach, IEEE Network 12(5) (1998), 50-60.
    • (1998) IEEE Network , vol.12 , Issue.5 , pp. 50-60
    • Bradley, K.A.1    Cheung, S.2    Puketza, N.3    Mukherjee, B.4    Olsson, R.A.5
  • 8
    • 4143130116 scopus 로고    scopus 로고
    • Oct. [Online]
    • CERT Coordination Center, Denial of service attacks, Oct. 1997. [Online] Available: http://www.cert.org/tech_tips/denial_of_service.html.
    • (1997) Denial of Service Attacks
  • 9
    • 0041488497 scopus 로고    scopus 로고
    • Feb. [Online]
    • CERT Coordination Center, Overview of attack trends, Feb. 2002. [Online] Available: http://www.cert.org/archive/pdf/attack_trends.pdf.
    • (2002) Overview of Attack Trends
  • 10
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • A. Chakrabarti and G. Manimaran, Internet infrastructure security: A taxonomy, IEEE Network 16(6) (2002), 13-21.
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 11
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • R.K. Chang, Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Commun. Mag. 40(10) (2002), 42-51.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.1
  • 13
    • 2342591623 scopus 로고    scopus 로고
    • Software security for open-source systems
    • C. Cowan, Software security for open-source systems, IEEE Security & Privacy 1(1) (2003), 38-45.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 38-45
    • Cowan, C.1
  • 21
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-Service attacks rip the Internet
    • L. Garber, Denial-of-Service attacks rip the Internet, IEEE Computer 33(4) (2000), 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 22
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, Chichester, England
    • D. Gollmann, Computer Security, John Wiley & Sons, Chichester, England, 1999.
    • (1999) Computer Security
    • Gollmann, D.1
  • 23
    • 0031190959 scopus 로고    scopus 로고
    • Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
    • B. Guha and B. Mukherjee, Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions, IEEE Network 11(4) (1997), 40-48.
    • (1997) IEEE Network , vol.11 , Issue.4 , pp. 40-48
    • Guha, B.1    Mukherjee, B.2
  • 31
    • 85039346416 scopus 로고    scopus 로고
    • Dec. [Online]
    • Lawrence Livermore National Laboratory and Sandia National Laboratories, Intrusion detection and response, Dec. 1996. [Online] Available: http://www.all.net/journal/ntb/ids.html.
    • (1996) Intrusion Detection and Response
  • 32
    • 2342489650 scopus 로고    scopus 로고
    • Virus wars: Fewer attacks, new threats
    • G. Lawton, Virus wars: Fewer attacks, new threats, IEEE Computer, 35(12) (2002), 22-24.
    • (2002) IEEE Computer , vol.35 , Issue.12 , pp. 22-24
    • Lawton, G.1
  • 36
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • C. Manikopoulos and S. Papavassiliou, Network intrusion and fault detection: A statistical anomaly approach, IEEE Commun. Mag. 40(10) (2002), 76-82.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 39
    • 29244457359 scopus 로고    scopus 로고
    • Mitigating DoS attacks against the DNS with dynamic TTL values
    • S. Liimatainen and T. Virtanen, eds, Espoo, Finland
    • J. Mölsä, Mitigating DoS attacks against the DNS with dynamic TTL values, in: Proceedings of the Ninth Nordic Workshop on Secure IT Systems, S. Liimatainen and T. Virtanen, eds, Espoo, Finland, 2004, pp. 118-124.
    • (2004) Proceedings of the Ninth Nordic Workshop on Secure IT Systems , pp. 118-124
    • Mölsä, J.1
  • 44
    • 3543130426 scopus 로고    scopus 로고
    • Dragon claws its way to the top
    • August 20
    • P. Mueller and G. Shipley, Dragon claws its way to the top, Network Computing (August 20) (2001) 45-67.
    • (2001) Network Computing , pp. 45-67
    • Mueller, P.1    Shipley, G.2
  • 47
    • 0036805086 scopus 로고    scopus 로고
    • Securing the Internet routing infrastructure
    • P. Papadimitratos and Z.J. Haas, Securing the Internet routing infrastructure, IEEE Commun. Mag. 40(10) (2002), 60-68.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 60-68
    • Papadimitratos, P.1    Haas, Z.J.2
  • 48
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, Bro: A system for detecting network intruders in real-time, Computer Networks 31(23-24) (1999), 2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 49
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review 31(3) (2001).
    • (2001) ACM SIGCOMM Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1
  • 55
    • 24344486810 scopus 로고    scopus 로고
    • The spread of the Witty worm
    • CAIDA
    • C. Shannon and D. Moore, The spread of the Witty worm, CAIDA, Tech. Rep., 2004.
    • (2004) Tech. Rep.
    • Shannon, C.1    Moore, D.2
  • 56
    • 0036947484 scopus 로고    scopus 로고
    • Beyond folklore: Observations on fragmented traffic
    • C. Shannon, D. Moore and K.C. Claffy, Beyond folklore: Observations on fragmented traffic, IEEE/ACM Trans. Networking 10(6) (2002) 709-720.
    • (2002) IEEE/ACM Trans. Networking , vol.10 , Issue.6 , pp. 709-720
    • Shannon, C.1    Moore, D.2    Claffy, K.C.3
  • 59
  • 62
    • 4243483478 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • HP laboratories, Bristol, June
    • M.M. Williamson, Throttling viruses: Restricting propagation to defeat malicious mobile code, HP laboratories, Bristol, Tech. Rep. HPL-2002-172, June 2002.
    • (2002) Tech. Rep. , vol.HPL-2002-172
    • Williamson, M.M.1
  • 63
    • 3042826627 scopus 로고    scopus 로고
    • A call to action: Look beyond the horizon
    • J.M. Wing, A call to action: Look beyond the horizon, IEEE Security & Privacy 1(6) (2003), 62-67.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 62-67
    • Wing, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.