메뉴 건너뛰기




Volumn , Issue , 2005, Pages 537-541

An autonomic approach to denial of service defence

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMIC ROUTING; COGNITIVE PACKET NETWORKS; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DISTRIBUTED DENIAL OF SERVICE ATTACK; FALSE ALARMS; MULTIPLE SOURCE; VIRUSES AND WORMS;

EID: 33745444330     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOWMOM.2005.24     Document Type: Conference Paper
Times cited : (33)

References (13)
  • 2
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Jul
    • V. Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM Computer Communications Review 31(3), Jul. 2001.
    • (2001) ACM Computer Communications Review , vol.31 , Issue.3
    • Paxson, V.1
  • 3
    • 0003804730 scopus 로고
    • A Weakness in the 4.2BSD Unix TCP/IP Software
    • AT&T Bell Labs, Feb
    • R.T. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report Computer Science #117, AT&T Bell Labs, Feb. 1985.
    • (1985) Technical Report Computer Science #117
    • Morris, R.T.1
  • 4
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • Jan
    • P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Tech. Rep. RFC 2267, Jan. 1998.
    • (1998) Tech. Rep. RFC 2267
    • Ferguson, P.1    Senie, D.2
  • 5
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for IP traceback
    • Stockholm, Sweden, Aug
    • S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. Proc. ACM SIGCOMM, pp. 295-306, Stockholm, Sweden, Aug. 2000.
    • (2000) Proc. ACM SIGCOMM , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 6
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering an effective defense against spoofed traffic
    • ISBN 1-58113-738-9, Washington DC, Oct
    • S. Jing, H. Wang, and K. Shin. Hop-Count Filtering An Effective Defense Against Spoofed Traffic. Proc. ACM Conference on Computer and Communications Security, pp. 30-41, ISBN 1-58113-738-9, Washington DC, Oct. 2003.
    • (2003) Proc. ACM Conference on Computer and Communications Security , pp. 30-41
    • Jing, S.1    Wang, H.2    Shin, K.3
  • 8
    • 33744945767 scopus 로고    scopus 로고
    • SOS: Secure overlay services
    • ISBN 1-58113-570-X, Pittsburgh, PA, Aug
    • A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. Proc. ACM SIGCOMM, pp. 61-72, ISBN 1-58113-570-X, Pittsburgh, PA, Aug. 2002.
    • (2002) Proc. ACM SIGCOMM , pp. 61-72
    • Keromytis, A.1    Misra, V.2    Rubenstein, D.3
  • 9
    • 33745470948 scopus 로고    scopus 로고
    • Forming alliance for DDoS defense
    • Centro Stefano Francini, Ascona, Switzerland, Aug
    • J. Mirkovic, P. Reiher, and M. Robinson. Forming Alliance for DDoS Defense. New Security Paradigms Workshop, Centro Stefano Francini, Ascona, Switzerland, Aug. 2003.
    • (2003) New Security Paradigms Workshop
    • Mirkovic, J.1    Reiher, P.2    Robinson, M.3
  • 10
    • 33846630543 scopus 로고    scopus 로고
    • Cognitive packet networks: Qos and performance
    • ISBN 0-7695-0728-X, Fort Worth, TX, Oct
    • E. Gelenbe, R. Lent, and Z. Xu. Cognitive Packet Networks: QoS and Performance. Proc. IEEE MASCOTS Conference, ISBN 0-7695-0728-X, pp. 3-12, Fort Worth, TX, Oct. 2002.
    • (2002) Proc. IEEE MASCOTS Conference , pp. 3-12
    • Gelenbe, E.1    Lent, R.2    Xu, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.