메뉴 건너뛰기




Volumn 4290 LNCS, Issue , 2006, Pages 260-280

A middleware system for protecting against application level denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER CRIME; ONLINE SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; BENCHMARKING; COMPUTER OPERATING SYSTEMS; HTTP; MIDDLEWARE; SEMANTICS; SOCIAL NETWORKING (ONLINE); TRANSMISSION CONTROL PROTOCOL;

EID: 33845924479     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11925071_14     Document Type: Conference Paper
Times cited : (10)

References (45)
  • 1
    • 33845957078 scopus 로고    scopus 로고
    • Netfilter/IPTables project home
    • Netfilter/IPTables project homepage. http://www.netfilter.org/.
  • 2
    • 33845950792 scopus 로고    scopus 로고
    • serverhttp://httpd.apache.org
    • Apache. Apache HTTP server, http://httpd.apache.org.
    • Apache
    • Apache1
  • 6
    • 33845945164 scopus 로고    scopus 로고
    • CERT. Incident note IN-2004-01 W32/Novarg.A virus, 2004.
    • CERT. Incident note IN-2004-01 W32/Novarg.A virus, 2004.
  • 11
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proceedings of Crypto, 1992.
    • (1992) Proceedings of Crypto
    • Dwork, C.1    Naor, M.2
  • 18
    • 33845952144 scopus 로고    scopus 로고
    • server
    • Halfbakery. Stateless TCP/IP server. http://www.halfbakery.com/idea/ Stateless_20TCP_2fIP_20server.
    • Stateless TCP/IP
    • Halfbakery1
  • 19
    • 33845927609 scopus 로고    scopus 로고
    • IBM
    • IBM. IBM network dispatcher features, http://www-3.ibm.com/software/ network/about/features/keyfeatures.html.
    • IBM network dispatcher features
  • 20
    • 33845947256 scopus 로고    scopus 로고
    • IBM. DB2 universal database, http://www-306.ibm.com/software/data/db2, 2005.
    • IBM. DB2 universal database, http://www-306.ibm.com/software/data/db2, 2005.
  • 22
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In Proceedings of NDSS, 1999.
    • (1999) Proceedings of NDSS
    • Juels, A.1    Brainard, J.2
  • 23
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
    • J. Jung, B. Krishnamurthy, and M. rabinovich. Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. In Proceedings of 10th WWW Conference, 2002.
    • (2002) Proceedings of 10th
    • Jung, J.1    Krishnamurthy, B.2    rabinovich, M.3
  • 28
    • 33845933116 scopus 로고    scopus 로고
    • East european gangs in online protection racket
    • in-online
    • J. Leyden. East european gangs in online protection racket, www.theregister.co.uk/2003/11/12/east-european-gangs-in-online/.
    • Leyden, J.1
  • 30
    • 33845934706 scopus 로고    scopus 로고
    • OpenSSL
    • OpenSSL. Openssl. http://www.openssl.org/.
    • Openssl
  • 34
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • V. A. Siris and F. Papagalou. Application of anomaly detection algorithms for detecting SYN flooding attacks. In Proceedings of IEEE Globecom, 2004.
    • (2004) Proceedings of IEEE Globecom
    • Siris, V.A.1    Papagalou, F.2
  • 35
    • 0002709112 scopus 로고    scopus 로고
    • Core-stateless fair queuing: A scalable architecture to approximate fair bandwidth allocations in high speed networks
    • I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queuing: A scalable architecture to approximate fair bandwidth allocations in high speed networks. In Proceedings of SIGCOMM, 1998.
    • (1998) Proceedings of SIGCOMM
    • Stoica, I.1    Shenker, S.2    Zhang, H.3
  • 40
    • 14844334596 scopus 로고    scopus 로고
    • Mitigating bandwidth exhaustion attacks using congestion puzzles
    • X. Wang and M. K. Reiter. Mitigating bandwidth exhaustion attacks using congestion puzzles. In Proceedings of 11th ACM CCS, 2004.
    • (2004) Proceedings of 11th ACM CCS
    • Wang, X.1    Reiter, M.K.2
  • 43
    • 67049147376 scopus 로고    scopus 로고
    • Wikipedia
    • Wikipedia. Comparison of web browsers. http://en.wikipedia.org/wiki/ Comparison_of-web.browsers.
    • Comparison of web browsers


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.