메뉴 건너뛰기




Volumn 2, Issue 4, 2005, Pages 324-335

Monitoring the macroscopic effect of DDoS flooding attacks

Author keywords

Attack dynamics; DDoS attack; Monitoring; Network traffic; Spatial temporal pattern

Indexed keywords

COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION ANALYSIS; MONITORING; PATTERN RECOGNITION; REAL TIME SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 30344436961     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2005.50     Document Type: Article
Times cited : (81)

References (43)
  • 1
    • 84976845043 scopus 로고
    • End-to-end arguments in system design
    • Nov.
    • J. Saltzer, D. Reed, and D. Clark, "End-to-End Arguments in System Design," ACM Trans. Computer System, vol. 2, no. 4, pp. 277-288, Nov. 1984.
    • (1984) ACM Trans. Computer System , vol.2 , Issue.4 , pp. 277-288
    • Saltzer, J.1    Reed, D.2    Clark, D.3
  • 3
    • 1642283261 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Computer Science Dept., Univ. of California, Los Angeles
    • J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report CSD-TR-020018, Computer Science Dept., Univ. of California, Los Angeles, 2001.
    • (2001) Technical Report , vol.CSD-TR-020018
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 7
    • 18144416990 scopus 로고    scopus 로고
    • A cross-correlation based method for spatial-temporal traffic analysis
    • J. Yuan and K. Mills, "A Cross-Correlation Based Method for Spatial-Temporal Traffic Analysis," J. Performance Evaluation, vol. 61, nos. 2-3, pp. 163-180, 2005.
    • (2005) J. Performance Evaluation , vol.61 , Issue.2-3 , pp. 163-180
    • Yuan, J.1    Mills, K.2
  • 8
    • 35048886560 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Service (DDoS) attacks through inductive learning
    • S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning," Lecture Notes in Computer Science, vol. 2690, pp. 286-295, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 10
    • 0942298614 scopus 로고    scopus 로고
    • Decision analysis of statistically detecting distributed DoS flooding attacks
    • M. Li and C. Chi, Decision Analysis of Statistically Detecting Distributed DoS Flooding Attacks," Int'l J. Information Technology and Decision Making, vol. 2, no. 3, pp. 397-405, 2003.
    • (2003) Int'l J. Information Technology and Decision Making , vol.2 , Issue.3 , pp. 397-405
    • Li, M.1    Chi, C.2
  • 12
    • 84950296089 scopus 로고    scopus 로고
    • Countering denial of service attacks using congestion triggered packet sampling and filtering
    • Y. Huang and J.M. Pullen, "Countering Denial of Service Attacks Using Congestion Triggered Packet Sampling and Filtering," Proc. 10th Int'l Conf. Computer Comm. and Networks, 2001.
    • (2001) Proc. 10th Int'l Conf. Computer Comm. and Networks
    • Huang, Y.1    Pullen, J.M.2
  • 13
    • 0035402092 scopus 로고    scopus 로고
    • On the defense of the distributed denial of service attacks: An on-off feedback control approach
    • Y. Xiong, S. Liu, and P. Sun, "On the Defense of the Distributed Denial of Service Attacks: An On-Off Feedback Control Approach," IEEE Trans. Systems, Man, and Cybernetics - PART A: Systems and Humans, vol. 31, no. 4, pp. 282-293, 2001.
    • (2001) IEEE Trans. Systems, Man, and Cybernetics - PART A: Systems and Humans , vol.31 , Issue.4 , pp. 282-293
    • Xiong, Y.1    Liu, S.2    Sun, P.3
  • 15
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Aug.
    • T.M. Gil and M. Poleto, "MULTOPS: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., pp. 23-38, Aug. 2001.
    • (2001) Proc. 10th Usenix Security Symp. , pp. 23-38
    • Gil, T.M.1    Poleto, M.2
  • 16
    • 33845536096 scopus 로고    scopus 로고
    • Detecting traffic anomalies through aggregate analysis of packet header data
    • May
    • S.S. Kim, A.L. N. Reddy, and M. Vannucci, "Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data," Proc. Networking 2004, pp. 1047-1059, May 2004.
    • (2004) Proc. Networking 2004 , pp. 1047-1059
    • Kim, S.S.1    Reddy, A.L.N.2    Vannucci, M.3
  • 17
    • 30344478008 scopus 로고    scopus 로고
    • ISPs take on DDoS attacks
    • Nov.
    • D. Pappalardo, "ISPs Take on DDoS Attacks," Computerworld, Nov. 2003.
    • (2003) Computerworld
    • Pappalardo, D.1
  • 18
    • 10644248262 scopus 로고    scopus 로고
    • Characterization of defense mechanisms against distributed denial of service attacks
    • L.-C. Chen, T.A. Longstaff, and K.M. Carley, "Characterization of Defense Mechanisms against Distributed Denial of Service Attacks," Computers and Security, vol. 23, no. 8, pp. 665-678, 2004.
    • (2004) Computers and Security , vol.23 , Issue.8 , pp. 665-678
    • Chen, L.-C.1    Longstaff, T.A.2    Carley, K.M.3
  • 23
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial of service attacks: A tutorial
    • R.K. C. Chang, "Defending against Flooding-Based Distributed Denial of Service Attacks: A Tutorial," IEEE Comm. Magazine, vol. 40, no. 10, pp. 42-51, 2002.
    • (2002) IEEE Comm. Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 25
    • 33745967097 scopus 로고    scopus 로고
    • Macroscopic dynamics of large-scale data networks
    • J. Yuan and K. Mills, "Macroscopic Dynamics of Large-Scale Data Networks," Complex Dynamics in Comm. Networks, pp. 191-212, 2005.
    • (2005) Complex Dynamics in Comm. Networks , pp. 191-212
    • Yuan, J.1    Mills, K.2
  • 27
    • 85013350011 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," Proc. ACM SIGCOMM '94 Conf., pp. 257-268, 1994.
    • (1994) Proc. ACM SIGCOMM '94 Conf. , pp. 257-268
    • Paxson, V.1    Floyd, S.2
  • 29
    • 33747578143 scopus 로고    scopus 로고
    • Dynamics of IP traffic: A study of the role of variability and the impact of control
    • A. Feldmann, A.C. Gilbert, P. Huang, and W. Willinger, "Dynamics of IP Traffic: A Study of the Role of Variability and the Impact of Control," Proc. ACM SIGCOMM '99 Conf., pp. 301-313, 1999.
    • (1999) Proc. ACM SIGCOMM '99 Conf. , pp. 301-313
    • Feldmann, A.1    Gilbert, A.C.2    Huang, P.3    Willinger, W.4
  • 30
    • 85013592037 scopus 로고
    • Self-similarity through high-variability: Statistical analysis of ethernet lan traffic at the source level
    • W. Willinger, M.S. Taqqu, R. Sherman, and D.V. Wilson, "Self-Similarity through High-Variability: Statistical Analysis of Ethernet Lan Traffic at the Source Level," Proc. ACM SIGCOMM '95 Conf., pp. 100-113, 1995.
    • (1995) Proc. ACM SIGCOMM '95 Conf. , pp. 100-113
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4
  • 31
    • 6944226924 scopus 로고    scopus 로고
    • Long-range dependence: Ten years of internet traffic modeling
    • Sept.-Oct.
    • T. Karagiannis, M. Molle, and M. Faloutsos, "Long-Range Dependence: Ten Years of Internet Traffic Modeling," IEEE Internet Computing, pp. 57-64, Sept.-Oct. 2004.
    • (2004) IEEE Internet Computing , pp. 57-64
    • Karagiannis, T.1    Molle, M.2    Faloutsos, M.3
  • 34
    • 0003554146 scopus 로고    scopus 로고
    • The MathWorks, Inc., Natick, Mass.
    • MATLAB User's Guide, The MathWorks, Inc., Natick, Mass., 1998.
    • (1998) MATLAB User's Guide
  • 35
    • 4043141148 scopus 로고    scopus 로고
    • Spectra and eigenvectors of scale-free networks
    • K.I. Goh, B. Kahng, and D. Kim, "Spectra and Eigenvectors of Scale-Free Networks," Physical Rev. E 64, 2001.
    • (2001) Physical Rev. E , vol.64
    • Goh, K.I.1    Kahng, B.2    Kim, D.3
  • 43
    • 0003552333 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network
    • AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, Feb.
    • R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," technical report, AT&T Center for Internet Research at ICSI (ACIRI) and AT&T Labs Research, Feb. 2001.
    • (2001) Technical Report
    • Mahajan, R.1    Bellovin, S.M.2    Floyd, S.3    Ioannidis, J.4    Paxson, V.5    Shenker, S.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.