메뉴 건너뛰기




Volumn 36, Issue 4, 2006, Pages 303-314

DDoS defense by offense

Author keywords

Bandwidth; Currency; DoS attack

Indexed keywords

COMPUTATIONAL RESOURCES; CURRENCY; DISTRIBUTED DENIAL OF SERVICE (DDOS); DOS ATTACK;

EID: 33750366503     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1151659.1159948     Document Type: Conference Paper
Times cited : (72)

References (51)
  • 3
    • 84978369629 scopus 로고    scopus 로고
    • System support for bandwidth management and content adaptation in Internet applications
    • Sept.
    • D. G. Andersen et al. System support for bandwidth management and content adaptation in Internet applications. In OSDI, Sept. 2000.
    • (2000) OSDI
    • Andersen, D.G.1
  • 4
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial-of-service with capabilities
    • Nov.
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In HotNets, Nov. 2003.
    • (2003) HotNets
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 5
    • 84859685489 scopus 로고    scopus 로고
    • Arbor Networks, Inc. http://www.arbornetworks.com.
  • 7
    • 84859691471 scopus 로고    scopus 로고
    • A. Back. Hashcash. http://www.cypherspace.org/adam/hashcash/.
    • Back, A.1
  • 8
    • 3042671755 scopus 로고    scopus 로고
    • Resource containers: A new facility for resource management in server systems
    • Feb.
    • G. Banga, P. Druschel, and J. C. Mogul. Resource containers: A new facility for resource management in server systems. In OSDI, Feb. 1999.
    • (1999) OSDI
    • Banga, G.1    Druschel, P.2    Mogul, J.C.3
  • 9
    • 84859692159 scopus 로고    scopus 로고
    • Cisco Guard
    • Cisco Guard, Cisco Systems, Inc. http://www.cisco.com.
  • 10
    • 84859692618 scopus 로고    scopus 로고
    • Criminal Complaint USA v. Ashley, Hall, Schictel, Roby, and Walker, Aug.
    • Criminal Complaint USA v. Ashley, Hall, Schictel, Roby, and Walker, Aug. 2004. http://www.reverse.net/operationcyberslam.pdf.
    • (2004)
  • 11
    • 18844375030 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam
    • C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In CRYPTO, 2003.
    • (2003) CRYPTO
    • Dwork, C.1    Goldberg, A.2    Naor, M.3
  • 12
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In CRYPTO, 1992.
    • (1992) CRYPTO
    • Dwork, C.1    Naor, M.2
  • 13
    • 84859685482 scopus 로고    scopus 로고
    • Emulab. http://www.emulab.net.
  • 14
    • 33645783230 scopus 로고    scopus 로고
    • An empirical study of "bogon" route advertisements
    • Jan.
    • N. Feamster, J. Jung, and H. Balakrishnan. An empirical study of "bogon" route advertisements. CCR, 35(1), Jan. 2005.
    • (2005) CCR , vol.35 , Issue.1
    • Feamster, N.1    Jung, J.2    Balakrishnan, H.3
  • 16
    • 14844282689 scopus 로고    scopus 로고
    • Guaranteeing access in spite of distributed service-flooding attacks
    • V. D. Gligor. Guaranteeing access in spite of distributed service-flooding attacks. In Intl. Wkshp. on Security Prots., 2003.
    • (2003) Intl. Wkshp. on Security Prots.
    • Gligor, V.D.1
  • 17
    • 33750327688 scopus 로고    scopus 로고
    • DoS protection for reliably authenticated broadcast
    • C. A. Gunter, S. Khanna, K. Tan, and S. Venkatesth. DoS protection for reliably authenticated broadcast. In NDSS, 2004.
    • (2004) NDSS
    • Gunter, C.A.1    Khanna, S.2    Tan, K.3    Venkatesth, S.4
  • 19
    • 26844548971 scopus 로고    scopus 로고
    • Honeynet Project and Research Alliance Mar.
    • Honeynet Project and Research Alliance. Know your enemy: Tracking botnets. Mar. 2005. http://www.honeynet.org/papers/bots/.
    • (2005) Know Your Enemy: Tracking Botnets
  • 20
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS, 1999.
    • (1999) NDSS
    • Juels, A.1    Brainard, J.2
  • 21
    • 36048986923 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
    • May
    • S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In USENIX NSDI, May 2005.
    • (2005) USENIX NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 22
    • 33845220105 scopus 로고    scopus 로고
    • Designing DCCP: Congestion control without reliability
    • Sept.
    • E. Kohler, M. Handley, and S. Floyd. Designing DCCP: Congestion control without reliability. In SIGCOMM, Sept. 2006.
    • (2006) SIGCOMM
    • Kohler, E.1    Handley, M.2    Floyd, S.3
  • 23
    • 33845403940 scopus 로고    scopus 로고
    • Building secure high-performance Web services with OKWS
    • June
    • M. Krohn. Building secure high-performance Web services with OKWS. In USENIX Technical Conference, June 2004.
    • (2004) USENIX Technical Conference
    • Krohn, M.1
  • 25
    • 84949199141 scopus 로고    scopus 로고
    • Mitigating distributed denial of service attacks with dynamic resource pricing
    • Dec.
    • D. Mankins, R. Krishnan, C. Boyd, J. Zao, and M. Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. In Proc. IEEE ACSAC, Dec. 2001.
    • (2001) Proc. IEEE ACSAC
    • Mankins, D.1    Krishnan, R.2    Boyd, C.3    Zao, J.4    Frentz, M.5
  • 27
    • 84859685484 scopus 로고    scopus 로고
    • Mazu Networks, Inc. http://mazunetworks.com.
  • 28
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Apr.
    • J. Mirkovic and P. Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms. CCR, 34(2), Apr. 2004.
    • (2004) CCR , vol.34 , Issue.2
    • Mirkovic, J.1    Reiher, P.2
  • 29
  • 30
    • 84859691016 scopus 로고    scopus 로고
    • Extortion via DDoS on the rise
    • May
    • Network World. Extortion via DDoS on the rise. May 2005. http://www.networkworld.com/news/2005/051605-ddos-extortion.html.
    • (2005) Network World
  • 32
    • 84859693564 scopus 로고    scopus 로고
    • CMU student taps brain's game skills
    • Oct. 5
    • Pittsburgh Post-Gazette. CMU student taps brain's game skills. Oct. 5, 2003. http://www.post-gazette.com/pg/03278/228349.stm.
    • (2003) Pittsburgh Post-gazette
  • 33
    • 84859685481 scopus 로고    scopus 로고
    • Prolexic Technologies, Inc. http://www.prolexic.com.
  • 34
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Sept.
    • A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In SIGCOMM, Sept. 2006.
    • (2006) SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 35
    • 27644465054 scopus 로고    scopus 로고
    • The design and implementation of a next generation name service for the Internet
    • Aug.
    • V. Ramasubramanian and E. G. Sirer. The design and implementation of a next generation name service for the Internet. In SIGCOMM, Aug. 2004.
    • (2004) SIGCOMM
    • Ramasubramanian, V.1    Sirer, E.G.2
  • 37
    • 33845939331 scopus 로고    scopus 로고
    • SecurityFocus Aug.
    • SecurityFocus. FBI busts alleged DDoS mafia. Aug. 2004. http://www.securityfocus.com/news/9411.
    • (2004) FBI Busts Alleged DDoS Mafia
  • 41
    • 33750361861 scopus 로고    scopus 로고
    • Spammer-X. Syngress
    • Spammer-X. Inside the SPAM Cartel. Syngress, 2004. Page 40.
    • (2004) Inside the SPAM Cartel , pp. 40
  • 43
    • 84859689607 scopus 로고    scopus 로고
    • TechWeb news
    • Oct.
    • TechWeb News. Dutch botnet bigger than expected. Oct. 2005. http://informationweek.com/story/showArticle.jhtm?articleID=172303265.
    • (2005) Dutch Botnet Bigger Than Expected
  • 44
    • 33750329253 scopus 로고    scopus 로고
    • East European gangs in online protection racket
    • Nov.
    • The Register. East European gangs in online protection racket. Nov. 2003.
    • (2003) The Register
  • 47
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • Feb.
    • L. von Ahn, M. Blum, and J. Langford. Telling humans and computers apart automatically. CACM, 47(2), Feb. 2004.
    • (2004) CACM , vol.47 , Issue.2
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 49
    • 84954449334 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • May
    • X. Wang and M. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symp. on Security and Privacy, May 2003.
    • (2003) IEEE Symp. on Security and Privacy
    • Wang, X.1    Reiter, M.2
  • 50
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks
    • May
    • A. Yaar, A. Perrig, and D. Song. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In IEEE Symp. on Security and Privacy, May 2004.
    • (2004) IEEE Symp. on Security and Privacy
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 51


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.