메뉴 건너뛰기




Volumn 3, Issue 6, 2005, Pages 34-40

The denial-of-service dance

Author keywords

[No Author keywords available]

Indexed keywords

CATEGORIZED ATTACKS; DENIAL-OF-SERVICE (DOS); HARDWARE CONNECTION; REMOTE ATTACKS;

EID: 30344461584     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2005.162     Document Type: Review
Times cited : (8)

References (13)
  • 1
    • 0033716995 scopus 로고    scopus 로고
    • 2000 CSI/FBI computer crime and security survey
    • R. Power, "2000 CSI/FBI Computer Crime and Security Survey," Computer Security J., vol. 16, no. 2, 2000, pp. 33-49.
    • (2000) Computer Security J. , vol.16 , Issue.2 , pp. 33-49
    • Power, R.1
  • 2
    • 84889319684 scopus 로고    scopus 로고
    • Risks of relying on cryptography
    • B. Schneier, "Risks of Relying on Cryptography," Comm. ACM, vol. 42, no. 10, 1999, p. 144.
    • (1999) Comm. ACM , vol.42 , Issue.10 , pp. 144
    • Schneier, B.1
  • 3
    • 0008922435 scopus 로고    scopus 로고
    • The XenoService-A distributed defeat for distributed denial of service
    • LNCS 1975, Springer-Verlag
    • J. Yan, S. Early, and R. Anderson, "The XenoService-A Distributed Defeat for Distributed Denial of Service," Proc. Information Survivability Workshop, LNCS 1975, Springer-Verlag, 2000, www.ftp.cl.cam.ac.uk/ftp/users/rja14/xeno.pdf.
    • (2000) Proc. Information Survivability Workshop
    • Yan, J.1    Early, S.2    Anderson, R.3
  • 4
    • 85034043506 scopus 로고    scopus 로고
    • Protecting web servers from distributed denial-of-service attacks
    • ACM Press
    • F. Kargi, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial-of-Service Attacks," Proc. Worldwide Web Conf. 10, ACM Press, 2001, pp. 514-524.
    • (2001) Proc. Worldwide Web Conf. , vol.10 , pp. 514-524
    • Kargi, F.1    Maier, J.2    Weber, M.3
  • 5
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack and prevention in power-law internets
    • ACM Press
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack and Prevention in Power-Law Internets," Proc. ACM Sigcomm, ACM Press, 2001, pp. 15-26.
    • (2001) Proc. ACM Sigcomm , pp. 15-26
    • Park, K.1    Lee, H.2
  • 6
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the internet topology
    • ACM Press
    • M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On Power-Law Relationships of the Internet Topology," Proc. ACM Sigcomm, ACM Press, 1999, pp. 251-262.
    • (1999) Proc. ACM Sigcomm , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 7
    • 9444231917 scopus 로고    scopus 로고
    • Defending against a large-scale denial-of-service attack
    • US Military Academy, West Point
    • S. Mohiuddin et al., "Defending Against a Large-Scale Denial-of-Service Attack," Proc. 2002 IEEE Workshop Information Assurance, US Military Academy, West Point, 2002, pp. 139-146.
    • (2002) Proc. 2002 IEEE Workshop Information Assurance , pp. 139-146
    • Mohiuddin, S.1
  • 8
    • 16244362550 scopus 로고    scopus 로고
    • What do we mean by network denial of service?
    • US Military Academy, West Point
    • C. Shields, "What Do We Mean by Network Denial of Service?" Proc. 2002 IEEE Workshop Information Assurance, US Military Academy, West Point, 2002, pp. 196-203.
    • (2002) Proc. 2002 IEEE Workshop Information Assurance , pp. 196-203
    • Shields, C.1
  • 10
    • 85008056769 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using cooperative intrusion detection
    • ACM Press
    • S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection," Proc. New Security Paradigms Workshop, ACM Press, 1997, pp. 94-106.
    • (1997) Proc. New Security Paradigms Workshop , pp. 94-106
    • Cheung, S.1    Levitt, K.N.2
  • 11
    • 0031703272 scopus 로고    scopus 로고
    • Detecting disruptive routers: A distributed network monitoring approach
    • IEEE CS Press
    • K.A. Bradley et al., "Detecting Disruptive Routers: A Distributed Network Monitoring Approach," Proc. 1998 IEEE Symp. Security and Privacy, IEEE CS Press, 1998, pp. 115-124.
    • (1998) Proc. 1998 IEEE Symp. Security and Privacy , pp. 115-124
    • Bradley, K.A.1
  • 12
    • 0004934998 scopus 로고
    • Vulnerabilities of network control protocols: An example
    • E.C. Rosen, "Vulnerabilities of Network Control Protocols: An Example," ACM Sigcomm Computer Comm. Rev., vol. 11, no. 3, 1981, pp. 10-16.
    • (1981) ACM Sigcomm Computer Comm. Rev. , vol.11 , Issue.3 , pp. 10-16
    • Rosen, E.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.