메뉴 건너뛰기




Volumn 50, Issue 13, 2006, Pages 2312-2330

Distributed mechanism in detecting and defending against the low-rate TCP attack

Author keywords

Dos attack; Low rate attack; Network security

Indexed keywords

BANDWIDTH; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; TELECOMMUNICATION TRAFFIC; TOPOLOGY;

EID: 33745661404     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.09.016     Document Type: Article
Times cited : (42)

References (24)
  • 1
    • 33745674712 scopus 로고    scopus 로고
    • M. Allman, V. Paxson, On estimating end-to-end network path properties, in: Proc. ACM SIGCOMM, Vancouver, Canada, September 1999.
  • 2
    • 33745648762 scopus 로고    scopus 로고
    • A. Kuzmanovic, E. Knightly, Low-rate TCP-targeted denial of service attacks, in: Proc. ACM SIGCOMM, Karlsruhe, Germany, August 2003.
  • 3
    • 0035703761 scopus 로고    scopus 로고
    • R. Mahajan, S. Floyd, D. Wetherall, Controlling high-bandwidth flows at the congested router, in: Proc. ICNP, Riverside, CA, November 2001.
  • 4
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Yau D.K.Y., Lui J.C.S., Liang F., and Yam Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Networking 13 1 (2005) 29-42
    • (2005) IEEE/ACM Trans. Networking , vol.13 , Issue.1 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4
  • 5
    • 0017930815 scopus 로고
    • Dynamic programming algorithm optimization for spoken word recognition
    • Sakoe H., and Chiba H. Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust., Speech, Signal Proc. ASSP-26 1 (1978)
    • (1978) IEEE Trans. Acoust., Speech, Signal Proc. , vol.ASSP-26 , Issue.1
    • Sakoe, H.1    Chiba, H.2
  • 6
    • 33745653576 scopus 로고    scopus 로고
    • E. Keogh, Exact indexing of dynamic time warping, in: Proceedings of the 28th VLDB Conference, Hong Kong, China, August 2002.
  • 8
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: evidence and possible causes
    • Crovella M.E., and Bestavros A. Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans. Networking 5 6 (1997) 835-846
    • (1997) IEEE/ACM Trans. Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 9
    • 33745677253 scopus 로고    scopus 로고
    • J. Liu, Traffic modeling based on farima models, in: Proceedings of the 1999 IEEE Canadian Conference on Electrical and Computer Engineering, May 1999.
  • 10
    • 0033666420 scopus 로고    scopus 로고
    • J. Ilow, Parameter estimation in farima processes with applications to network traffic modeling, in: Proceedings of the Tenth IEEE Workshop on Statistical Signal and Array Processing, August 2000.
  • 11
  • 12
    • 0028599989 scopus 로고    scopus 로고
    • S. Golestani, A self clocked fair queueing scheme for broadband applications, in: Proc. IEEE INFOCOM, 1994.
  • 13
  • 14
    • 33745644275 scopus 로고    scopus 로고
    • (2004, Jan.) Understanding and configuring mdrr/wred on the cisco 12000 series internet router. [Online]. Available: http://www.cisco.com/warp/public/63/mdrr_wred_overview.html.
  • 15
    • 0030189675 scopus 로고    scopus 로고
    • Simulation-based comparisons of tahoe, reno, and sack tcp
    • Fall K., and Floyd S. Simulation-based comparisons of tahoe, reno, and sack tcp. ACM Comput. Commun. Rev. 5 3 (1996) 5-21
    • (1996) ACM Comput. Commun. Rev. , vol.5 , Issue.3 , pp. 5-21
    • Fall, K.1    Floyd, S.2
  • 16
    • 33745657874 scopus 로고    scopus 로고
    • TCP SYN flooding and IP spoofing attacks, CERT Advisory CA- 96.21, Available from http://www.cert.org/.
  • 17
    • 33745666524 scopus 로고    scopus 로고
    • Smurf IP denial-of-service attacks, CERT Advisory CA-1998-01, January 1998, Available from www.cert.org/advisories/CA-98.01.html.
  • 18
    • 33745674305 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proc. ACM SIGCOMM, Stockholm, Sweden, August 2000.
  • 19
    • 0034997397 scopus 로고    scopus 로고
    • D. Song, A. Perrig, Advanced and authenticated techniques for IP traceback, in: Proc. IEEE INFOCOM, Anchorage, Alaska, 2001.
  • 20
    • 33745657278 scopus 로고    scopus 로고
    • Blackhole route server and tracking traffic on an IP network, Available from http://www.secsup.org/Tracking.
  • 21
    • 85129521050 scopus 로고    scopus 로고
    • G. Yang, M. Gerla, M.Y. Sanadidi, Defense against low-rate TCPtargeted denial-of-service attacks, in: Proc. ISCC, Alexandria, Egypt, 2004.
  • 22
    • 33745660587 scopus 로고    scopus 로고
    • A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, W.T. Strayer, Hash-based ip traceback, in: ACM SIGCOMM, San Diego, August 2001.
  • 23
    • 33745639032 scopus 로고    scopus 로고
    • D. Katabi, M. Handley, C. Rohrs, Congestion control for high bandwidth-delay product networks, in: Proc. ACM SIGCOMM, Pittsburgh, PA, August 2002.
  • 24
    • 17744369470 scopus 로고    scopus 로고
    • A.M.I. Guirguis, M. Bestavros, Exploiting the transients of adaptation for roq attacks on internet resources, in: Proceedings of the 12th IEEE International Conference on Network Protocols, Oct 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.