메뉴 건너뛰기




Volumn II, Issue , 2005, Pages 431-436

A defense system against DDoS attacks by large-scale IP traceback

Author keywords

[No Author keywords available]

Indexed keywords

DETERMINISTIC PACKET MARKING (DPM); DISTRIBUTED DENIAL OF SERVICE (DDOS); FLEXIBLE DETERMINISTIC PACKET MARKING (FDPM); TRACEBACK PROCESS;

EID: 33646781314     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (24)
  • 3
    • 84858881721 scopus 로고    scopus 로고
    • Accessed 7 Sept 2004
    • Computer Emergency Response Team, CERT, http://www.cert.org. Accessed 7 Sept 2004.
  • 4
    • 33646822025 scopus 로고    scopus 로고
    • An active distributed defense system to protect web applications from DDoS attacks
    • Y. Xiang and W. Zhou, "An Active Distributed Defense System to Protect Web Applications from DDoS Attacks", iiWAS2004, pp. 559-568.
    • iiWAS2004 , pp. 559-568
    • Xiang, Y.1    Zhou, W.2
  • 5
    • 3042825073 scopus 로고    scopus 로고
    • IP traceback: A new denial-of-service deterrent?
    • H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent?", IEEE Security & Privacy, 1(3), 2003, pp.24-31.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 24-31
    • Aljifri, H.1
  • 7
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • T. M. Gil, and M. Poletto, "MULTOPS: a data-structure for bandwidth attack detection", 10th Usenix Security Symposium, 2001, pp.23-38.
    • (2001) 10th Usenix Security Symposium , pp. 23-38
    • Gil, T.M.1    Poletto, M.2
  • 8
    • 0035703761 scopus 로고    scopus 로고
    • Controlling high-bandwidth flows at the congested router
    • R. Mahajan, S. Floyd, and D. Wetherall, "Controlling High-Bandwidth Flows at the Congested Router", IEEE ICNP 2001, pp. 192-201.
    • IEEE ICNP 2001 , pp. 192-201
    • Mahajan, R.1    Floyd, S.2    Wetherall, D.3
  • 9
    • 28844439716 scopus 로고    scopus 로고
    • A survey of active and passive defence mechanisms against DDoS attacks
    • School of Information Technology, Deakin University, Australia
    • Y. Xiang, W. Zhou, and M. Chowdhury, "A Survey of Active and Passive Defence Mechanisms against DDoS Attacks", Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia, 2004.
    • (2004) Technical Report , vol.TR C04-02
    • Xiang, Y.1    Zhou, W.2    Chowdhury, M.3
  • 10
    • 85084163540 scopus 로고    scopus 로고
    • Center-track: An IP overlay network for tracking DoS floods
    • R. Stone, "Center-Track: An IP Overlay Network for Tracking DoS Floods", 9th Usenix Security Symposium, 2000, pp.199-212.
    • (2000) 9th Usenix Security Symposium , pp. 199-212
    • Stone, R.1
  • 11
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source", LISA 2000, pp.319-327.
    • LISA 2000 , pp. 319-327
    • Burch, H.1    Cheswick, B.2
  • 12
    • 0004075434 scopus 로고    scopus 로고
    • ICMP traceback messages
    • Network Working Group
    • S. M. Bellovin, "ICMP Traceback Messages", Internet Draft, Network Working Group, 2000.
    • (2000) Internet Draft
    • Bellovin, S.M.1
  • 14
    • 0033650827 scopus 로고    scopus 로고
    • Trajectory sampling for direct traffic observation
    • N. G. Duffield and M. Grossglauser, "Trajectory sampling for direct traffic observation", ACM SIGCOMM 2000, pp.271-282.
    • ACM SIGCOMM 2000 , pp. 271-282
    • Duffield, N.G.1    Grossglauser, M.2
  • 16
    • 0036329754 scopus 로고    scopus 로고
    • Tracing network attacks to their sources
    • T. Baba and S. Matsuda, "Tracing Network Attacks to Their Sources", IEEE Internet Computing, 6(3), 2002, pp.20-26.
    • (2002) IEEE Internet Computing , vol.6 , Issue.3 , pp. 20-26
    • Baba, T.1    Matsuda, S.2
  • 19
    • 0842310839 scopus 로고    scopus 로고
    • Defeating distributed denial-of-service attack with deterministic bit marking
    • Y. Kim, J.-Y. Jo, F. L. Merat, "Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking," IEEE GLOBECOM, pp.1363-1367, 2003.
    • (2003) IEEE GLOBECOM , pp. 1363-1367
    • Kim, Y.1    Jo, J.-Y.2    Merat, F.L.3
  • 20
    • 0003792670 scopus 로고
    • Type of service in the internet protocol suite
    • Network Working Group
    • RFC1349, "Type of Service in the Internet Protocol Suite", Network Working Group, 1992.
    • (1992) RFC1349
  • 21
    • 0003256793 scopus 로고    scopus 로고
    • Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 headers
    • Network Working Group
    • RFC2474, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", Network Working Group, 1998.
    • (1998) RFC2474
  • 22
    • 0033204164 scopus 로고    scopus 로고
    • Providing guaranteed services without per flow management
    • I. Stocia, and H. Zhang, "Providing Guaranteed Services Without Per Flow Management", ACM SIGCOMM 1999, pp.81-94.
    • (1999) ACM SIGCOMM , pp. 81-94
    • Stocia, I.1    Zhang, H.2
  • 23
    • 0035331939 scopus 로고    scopus 로고
    • Congestion control mechanisms and the best effort service model
    • P. Gevros, J. Crowcroft, P. Kirstein, and S. Bhatti, "Congestion Control Mechanisms and the Best Effort Service Model", IEEE Network, 15(3), 2001, pp.16-26.
    • (2001) IEEE Network , vol.15 , Issue.3 , pp. 16-26
    • Gevros, P.1    Crowcroft, J.2    Kirstein, P.3    Bhatti, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.