메뉴 건너뛰기




Volumn 24, Issue 10, 2006, Pages 1889-1899

Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

Author keywords

Distributed denial of service (DDoS); Intrusion detection; Routers; Testbed

Indexed keywords

DISTRIBUTED DENIAL-OF-SERVICE (DDOS); INTRUSION DETECTION; TESTBED;

EID: 33749851980     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2006.877214     Document Type: Article
Times cited : (10)

References (43)
  • 2
    • 0003521721 scopus 로고    scopus 로고
    • (AF-TM-0121.000), The ATM Forum Technical Committee
    • Traffic Management Specification ver. 4.1, (AF-TM-0121.000), 1999, The ATM Forum Technical Committee.
    • (1999) Traffic Management Specification Ver. 4.1
  • 4
    • 27544436002 scopus 로고    scopus 로고
    • Mar. [Online] revision 1.3
    • J Barlow and W Thrower, "TFN2K - An analysis," Mar. 2003. [Online]. Available: http://ecurityresponse.Symantec.com/avcenter/security/ Content/2000$_$02$_$10$_$a.html, (revision 1.3).
    • (2003) TFN2K - An Analysis
    • Barlow, J.1    Thrower, W.2
  • 5
    • 8344278876 scopus 로고    scopus 로고
    • ICMP traceback messages
    • draft-ietf-itrace-01.txt, Oct.
    • S. M. Bellovin, M Leech, and T Taylor, "ICMP traceback messages," Internet Draft, draft-ietf-itrace-01.txt, Oct. 2001.
    • (2001) Internet Draft
    • Bellovin, S.M.1    Leech, M.2    Taylor, T.3
  • 6
    • 14944374775 scopus 로고    scopus 로고
    • [Online]
    • D. J. Bernstein, "Syn cookies," 1996. [Online]. Available: http://cr.yp.to/syncookies.html
    • (1996) Syn Cookies
    • Bernstein, D.J.1
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Jul.
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," in Proc. Commun. ACM, Jul. 1970, vol. 13, pp. 422-426.
    • (1970) Proc. Commun. ACM , vol.13 , pp. 422-426
    • Bloom, B.1
  • 9
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • H. Burch and B Cheswick, "Tracing anonymous packets to their approximate source," in Proc. USENIX LISA, 2000, pp. 319-328.
    • (2000) Proc. USENIX LISA , pp. 319-328
    • Burch, H.1    Cheswick, B.2
  • 10
    • 3543070612 scopus 로고    scopus 로고
    • IDR: Intrusion detection router for defending distributed denial-of-service (DDoS) attack
    • May
    • E. Chan, "IDR: Intrusion detection router for defending distributed denial-of-service (DDoS) attack," in Proc ISPAN, May 2004, pp. 581-586.
    • (2004) Proc ISPAN , pp. 581-586
    • Chan, E.1
  • 12
    • 3242808612 scopus 로고    scopus 로고
    • [Online]
    • Computer Security Institute and Federal Bureau of Investigation, "CSI/FBI computer crime and security survey," 2003. [Online]. Available: http://www.gocsi.com
    • (2003) CSI/FBI Computer Crime and Security Survey
  • 13
    • 0344559509 scopus 로고    scopus 로고
    • [Online]
    • U.S. Department of Homeland Security, "The national strategy to security Cyberspace," 2003. [Online]. Available: http://www.dhs.gov/ interweb/assetlibrary/National_Cyberspace_S trategy.pdf
    • (2003) The National Strategy to Security Cyberspace
  • 14
    • 33744912228 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting
    • C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. SIGCOMM, 2002, pp. 323-336.
    • (2002) Proc. SIGCOMM , pp. 323-336
    • Estan, C.1    Varghese, G.2
  • 15
    • 0035012756 scopus 로고    scopus 로고
    • Stochastic fair blue: A queue management algorithm for enforcing fairness
    • Apr.
    • W. C. Feng, K. G. Shin, D. Kandlur, and D. Saha, "Stochastic fair blue: A queue management algorithm for enforcing fairness," in Proc. IEEE INFOCOM, Apr. 2001, pp. 1520-1529.
    • (2001) Proc. IEEE INFOCOM , pp. 1520-1529
    • Feng, W.C.1    Shin, K.G.2    Kandlur, D.3    Saha, D.4
  • 16
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • IETF, May
    • P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing," IETF, RFC2827, May 2000.
    • (2000) RFC2827
    • Ferguson, P.1    Senie, D.2
  • 17
    • 0029356674 scopus 로고
    • Link-sharing and resource management models for packet networks
    • Aug.
    • S Floyd and V. Jacobson, "Link-sharing and resource management models for packet networks," IEEE/ACM Trans. Netw., vol. 3, no. 4, pp. 365-386, Aug. 1995.
    • (1995) IEEE/ACM Trans. Netw. , vol.3 , Issue.4 , pp. 365-386
    • Floyd, S.1    Jacobson, V.2
  • 18
    • 33749859549 scopus 로고
    • Notes of class-based queueing: Setting parameters
    • [Online]
    • S. Floyd, "Notes of class-based queueing: Setting parameters," 1995. [Online], Available: ftp://ftp.ee.lbl.gov/papers/params.ps.Z, Informal notes
    • (1995) Informal Notes
    • Floyd, S.1
  • 19
    • 33749871596 scopus 로고    scopus 로고
    • Single packet IP traceback in AS-level partial deployment scenario
    • Chao Gong, Trinh Le, Turgay Korkmaz, and Kamil Sarac, "Single packet IP traceback in AS-level partial deployment scenario," in Proc. IEEE GLOBECOM, 2005, pp. 1817-1821.
    • (2005) Proc. IEEE GLOBECOM , pp. 1817-1821
    • Gong, C.1    Le, T.2    Korkmaz, T.3    Sarac, K.4
  • 20
    • 1242287724 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • Karlsruhe, Germany, Aug.
    • A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, Karlsruhe, Germany, Aug. 2003, pp. 99-110.
    • (2003) Proc. ACM SIGCOMM , pp. 99-110
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 21
    • 85013623251 scopus 로고
    • Congestion avoidance and control
    • V. acobson and M. J. Karels, "Congestion avoidance and control," in Proc. ACM SIGCOMM, 1988, pp. 314-329.
    • (1988) Proc. ACM SIGCOMM , pp. 314-329
    • Acobson, V.1    Karels, M.J.2
  • 22
    • 19544365925 scopus 로고    scopus 로고
    • Source-level IP packets bursts: Causes and effects
    • Miami, FL, Oct.
    • H. Jiang and C. Dovrolis, "Source-level IP packets bursts: Causes and effects," in Proc. ACM Internet Measurements Conf., Miami, FL, Oct. 2003, pp. 301-306.
    • (2003) Proc. ACM Internet Measurements Conf. , pp. 301-306
    • Jiang, H.1    Dovrolis, C.2
  • 23
    • 33749861353 scopus 로고    scopus 로고
    • S. Jin and D. S. Yeung, IEEE Commun. Soc., 2004
    • S. Jin and D. S. Yeung, IEEE Commun. Soc., 2004.
  • 24
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistical-based overload control against distributed denial of service attacks
    • Mar.
    • Y. Kim, W. C. Lau, M. C. Chuah, and J. H. Chao, "PacketScore: Statistical-based overload control against distributed denial of service attacks," in Proc. IEEE INFOCOM, Mar. 2004, pp. 2594-2604.
    • (2004) Proc. IEEE INFOCOM , pp. 2594-2604
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, J.H.4
  • 25
    • 0348252034 scopus 로고    scopus 로고
    • A simple algorithm for finding frequent elements in streams and Bags
    • Mar.
    • R. M. Karp, S. Shenker, and C. H. Papadimitriou, "A simple algorithm for finding frequent elements in streams and Bags," ACM Trans. Datab. Syst., vol. 28, no. 1, pp. 51-55, Mar. 2003.
    • (2003) ACM Trans. Datab. Syst. , vol.28 , Issue.1 , pp. 51-55
    • Karp, R.M.1    Shenker, S.2    Papadimitriou, C.H.3
  • 26
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • C. Krügel, T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection," ACM SAC, pp. 201-208, 2002.
    • (2002) ACM SAC , pp. 201-208
    • Krügel, C.1    Toth, T.2    Kirda, E.3
  • 27
    • 33749838207 scopus 로고    scopus 로고
    • [Online]
    • [Online], Available: http://www.tcpdump.org/
  • 30
  • 31
    • 84904888755 scopus 로고    scopus 로고
    • Attacking DDoS at the source
    • Nov.
    • J. Mirkovic, P. Reiher, and G. Prier, "Attacking DDoS at the source," in Proc. ICNP, Nov. 2002, pp. 312-321.
    • (2002) Proc. ICNP , pp. 312-321
    • Mirkovic, J.1    Reiher, P.2    Prier, G.3
  • 33
    • 33749819153 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available: http://www-nrg.ee.lbl.gov/ns
  • 35
    • 33749829054 scopus 로고    scopus 로고
    • Defending against slave and reflector attacks
    • Invited Lecture
    • S. K. Rayanchu, "Defending against slave and reflector attacks," in Proc. Nat. Conf. Commun., 2005, Invited Lecture.
    • (2005) Proc. Nat. Conf. Commun.
    • Rayanchu, S.K.1
  • 42
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in Proc. IEEE Symp. Security Privacy, 2003, pp. 93-107.
    • (2003) Proc. IEEE Symp. Security Privacy , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 43
    • 15544363902 scopus 로고    scopus 로고
    • Defending Against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • D. K. Y. Yau, J. C. S. Lui, F. Liang, and Y. Yam, "Defending Against distributed denial-of-service attacks with max-min fair server-centric router throttles," IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 29-42, 2005.
    • (2005) IEEE/ACM Trans. Netw. , vol.13 , Issue.1 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.