메뉴 건너뛰기




Volumn 35, Issue 3, 2005, Pages 47-60

On the robustness of router-based Denial-of-Service (DoS) defense systems

Author keywords

Denial of Service; Router based Defense

Indexed keywords

COMPUTER NETWORKS; ROBUSTNESS (CONTROL SYSTEMS); ROUTERS; SECURITY SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 33645785346     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1070873.1070878     Document Type: Review
Times cited : (24)

References (28)
  • 1
    • 33645789038 scopus 로고    scopus 로고
    • Arbor networks. http://www.arbornetworks.com/resources_overview.php.
  • 2
    • 33645778005 scopus 로고    scopus 로고
    • Mazu profiler. http://www.mazunetworks.com/white_papers/.
    • Mazu Profiler
  • 4
    • 33645771704 scopus 로고    scopus 로고
    • Riverhead networks, http://www.riverhead.com/index2.html.
  • 5
    • 0034997113 scopus 로고    scopus 로고
    • Binomial congestion control algorithms
    • Anchorage, AK, April
    • D. Bansal and H. Balakrishnan. Binomial congestion control algorithms. In Proc. IEEE INFOCOM'01, pages 631-640, Anchorage, AK, April 2001.
    • (2001) Proc. IEEE INFOCOM'01 , pp. 631-640
    • Bansal, D.1    Balakrishnan, H.2
  • 6
    • 0004075434 scopus 로고    scopus 로고
    • ICMP traceback messages
    • (work in progress), IETF
    • S. M. Bellovin. ICMP traceback messages. Internet draft (work in progress), IETF, 2000. http://wwwl .cs.columbia.edu/ smb/papers/draft-bellovin- itrace-00.txt.
    • (2000) Internet Draft
    • Bellovin, S.M.1
  • 7
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • IETF, January
    • P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. Request For Comments (Proposed Standard) RFC 2267, IETF, January 1998.
    • (1998) Request for Comments (Proposed Standard) RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 8
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the Internet
    • S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. Netw., 7(4):458-472, 1999.
    • (1999) IEEE/ACM Trans. Netw. , vol.7 , Issue.4 , pp. 458-472
    • Floyd, S.1    Fall, K.2
  • 9
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • S. Floyd and V. Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Trans. Netw., 1(4):397-413, 1993.
    • (1993) IEEE/ACM Trans. Netw. , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobson, V.2
  • 10
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Washington, DC, July
    • T. M. Gil and M. Poletto. MULTOPS: A data-structure for bandwidth attack detection. In Proc. USENIX Security Symposium, pages 23-28, Washington, DC, July 2001.
    • (2001) Proc. USENIX Security Symposium , pp. 23-28
    • Gil, T.M.1    Poletto, M.2
  • 11
    • 17744369470 scopus 로고    scopus 로고
    • Exploiting the transients of adaptation for RoQ attacks on internet resources
    • M. Guirguis, A. Bestavros, and I. Malta. Exploiting the transients of adaptation for RoQ attacks on internet resources. In Proc. IEEEICNP'04, pages 184-195, 2004.
    • (2004) Proc. IEEEICNP'04 , pp. 184-195
    • Guirguis, M.1    Bestavros, A.2    Malta, I.3
  • 12
    • 0011134472 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • February
    • J. loannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In Proc. NDSS'02, February 2002.
    • (2002) Proc. NDSS'02
    • Loannidis, J.1    Bellovin, S.M.2
  • 13
    • 33645793249 scopus 로고    scopus 로고
    • Guardian: A router mechanism for extreme overload prevention
    • August
    • H. Jiang and C. Dovrolis. Guardian: A router mechanism for extreme overload prevention. In Proc. ITCOM'02, August 2002.
    • (2002) Proc. ITCOM'02
    • Jiang, H.1    Dovrolis, C.2
  • 14
    • 14944386850 scopus 로고    scopus 로고
    • On scalable attack detection in the network
    • Taormina, Sicily, Italy, October
    • R. R. Kompella, S. Singh, and G. Varghese. On scalable attack detection in the network. In Proc. IMC' 2004, pages 187-200, Taormina, Sicily, Italy, October 2004.
    • (2004) Proc. IMC' 2004 , pp. 187-200
    • Kompella, R.R.1    Singh, S.2    Varghese, G.3
  • 15
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants
    • A. Kuzmanovic and E. W. Knightly. Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In Proc. ACM SIGCOMM'03, pages 75-86, 2003.
    • (2003) Proc. ACM SIGCOMM'03 , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 16
    • 0030609305 scopus 로고    scopus 로고
    • Dynamics of random early detection
    • D. Lin and R. Morris. Dynamics of random early detection. In Proc. ACM SIGCOMM'97, pages 127-137, 1997.
    • (1997) Proc. ACM SIGCOMM'97 , pp. 127-137
    • Lin, D.1    Morris, R.2
  • 18
    • 0035703761 scopus 로고    scopus 로고
    • Controlling high-bandwidth flows at the congested router
    • R. Mahajan and S. Floyd. Controlling high-bandwidth flows at the congested router. In Proc. lEEE ICNP'01, pages 192-201, 2001.
    • (2001) Proc. LEEE ICNP'01 , pp. 192-201
    • Mahajan, R.1    Floyd, S.2
  • 20
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • J. Mirkovic and P. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev., 34(2):39-53, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 22
    • 0033905870 scopus 로고    scopus 로고
    • CHOKe, a stateless active queue management scheme for approximating fair bandwidth allocation
    • Tel-Aviv, Israel, March
    • R. Pan, B. Prabhakar, and K. Psounis. CHOKe, a stateless active queue management scheme for approximating fair bandwidth allocation. In Proc. IEEE INFOCOM'00, pages 942-951, Tel-Aviv, Israel, March 2000.
    • (2000) Proc. IEEE INFOCOM'00 , pp. 942-951
    • Pan, R.1    Prabhakar, B.2    Psounis, K.3
  • 24
    • 0032178367 scopus 로고    scopus 로고
    • Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks
    • I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queueing: achieving approximately fair bandwidth allocations in high speed networks. In Proc. ACM SIGCOMM'98, pages 118-130, 1998.
    • (1998) Proc. ACM SIGCOMM'98 , pp. 118-130
    • Stoica, I.1    Shenker, S.2    Zhang, H.3
  • 25
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • New York, NY, June
    • H. Wang, D. Zhang, and K. G. Shin. Detecting SYN flooding attacks. In Proc. IEEE INFOCOM'2002, pages 1530-1539, New York, NY, June 2002.
    • (2002) Proc. IEEE INFOCOM'2002 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 26
    • 33645792808 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • Philadelphia, PA, August
    • K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: Behavior models and applications. In Proc. ACM SIGCOMM'05, Philadelphia, PA, August 2005.
    • (2005) Proc. ACM SIGCOMM'05
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 27
    • 33645776922 scopus 로고    scopus 로고
    • A double horizon defense scheme for robust regulation of malicious traffic
    • in preparation, University of Pennsylvania
    • Y. Xu and R. Guerin. A double horizon defense scheme for robust regulation of malicious traffic. Technical report in preparation, University of Pennsylvania, 2005.
    • (2005) Technical Report
    • Xu, Y.1    Guerin, R.2
  • 28
    • 33645760181 scopus 로고    scopus 로고
    • On the robustness of router-based Denial-of-Service (DoS) defense systems
    • University of Pennsylvania, March
    • Y. Xu and R. Guerin. On the robustness of router-based denial-of-service (DoS) defense systems. Technical report, University of Pennsylvania, March 2005. Available at: http://einstein.seas.upenn.edu/mnlab/publications.html.
    • (2005) Technical Report
    • Xu, Y.1    Guerin, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.