메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 316-325

Emulation versus simulation: A case study of TCP-targeted denial of service attacks

Author keywords

Congestion control; Denial of service attacks; Emulation; Low rate TCP targeted attacks; Simulation; TCP; Testbeds

Indexed keywords

ATTACK PACKET SIZE; LOW-RATE TCP-TARGETED ATTACKS; RETRANSMISSION TIMEOUT; SERVICE ATTACK DENIAL;

EID: 33847138567     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TRIDNT.2006.1649164     Document Type: Conference Paper
Times cited : (34)

References (39)
  • 1
    • 33847174871 scopus 로고    scopus 로고
    • http://www.sangoma.com.
  • 4
    • 33847100827 scopus 로고    scopus 로고
    • PC300, The Router Killer
    • PC300 - The Router Killer. http://www.cyclades.com/resources/?wp=6.
  • 5
    • 84868981924 scopus 로고    scopus 로고
    • December
    • OSS network routers. http://www.siriusit.co.uk/docs/doc.php?pageID= 8&typeID=3, December 2004.
    • (2004) OSS network routers
  • 8
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for internet services
    • D. G. Andersen. Mayday: Distributed filtering for internet services. In Proceedings of USITS, 2003.
    • (2003) Proceedings of USITS
    • Andersen, D.G.1
  • 11
    • 33847156226 scopus 로고    scopus 로고
    • D. Dittrich. The "stacheldraht" distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/stacheldraht.analysis, 1999.
    • (1999) The stacheldraht
    • Dittrich, D.1
  • 13
    • 4243137229 scopus 로고    scopus 로고
    • Cyber defense technology networking and evaluation
    • March
    • R. Bajcsy et. al. Cyber defense technology networking and evaluation. Communications of the ACM, 47(3):58-61, March 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.3 , pp. 58-61
    • Bajcsy, R.1    et., al.2
  • 14
    • 0003422785 scopus 로고    scopus 로고
    • The NewReno modification to TCP's fast recovery algorithm. RFC 2582
    • April
    • S. Floyd and T. Henderson. The NewReno modification to TCP's fast recovery algorithm. RFC 2582, April 1999.
    • (1999)
    • Floyd, S.1    Henderson, T.2
  • 15
    • 1642499093 scopus 로고    scopus 로고
    • Internet research needs better models
    • S. Floyd and E. Kohler. Internet research needs better models. SIGCOMM Comput. Commun. Rev., 33(1):29-34, 2003.
    • (2003) SIGCOMM Comput. Commun. Rev , vol.33 , Issue.1 , pp. 29-34
    • Floyd, S.1    Kohler, E.2
  • 16
    • 17744369470 scopus 로고    scopus 로고
    • Exploiting the transients of adaptation for RoQ attacks on internet resources
    • Oct
    • M. Guirguis, A. Bestavros, and I. Matta. Exploiting the transients of adaptation for RoQ attacks on internet resources. In Proceedings of ICNP, Oct 2004.
    • (2004) Proceedings of ICNP
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3
  • 18
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • Feb
    • J. Ioannidis and S. M. Bellovin. Implementing pushback: Router-based defense against DDoS attacks. In NDSS, Feb 2002.
    • (2002) NDSS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 19
    • 85013623251 scopus 로고
    • Congestion avoidance and control
    • August
    • V. Jacobson. Congestion avoidance and control. In Proc. of the ACM SIGCOMM, volume 18, pages 314-329, August 1988.
    • (1988) Proc. of the ACM SIGCOMM , vol.18 , pp. 314-329
    • Jacobson, V.1
  • 20
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: An effective defense against spoofed DoS traffic
    • Oct
    • C. Jin, H. Wang, and K. G. Shin. Hop-count filtering: An effective defense against spoofed DoS traffic. In Proc. of ACM CCS, pages 30-41, Oct 2003.
    • (2003) Proc. of ACM CCS , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 22
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)
    • August
    • A. Kuzmanovic and E. W Knightly. Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants). In Proc. of ACM SIGCOMM, August 2003.
    • (2003) Proc. of ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 23
    • 0030609305 scopus 로고    scopus 로고
    • Dynamics of random early dectection
    • September
    • D. Lin and R. Morris. Dynamics of random early dectection. In Proc. of the ACM SIGCOMM, volume 27, pages 127-136, September 1997.
    • (1997) Proc. of the ACM SIGCOMM , vol.27 , pp. 127-136
    • Lin, D.1    Morris, R.2
  • 25
    • 0035703761 scopus 로고    scopus 로고
    • Controlling high-bandwidth flows at the congested router
    • November
    • R. Mahajan, S. Floyd, and D. Wetherall. Controlling high-bandwidth flows at the congested router. In P roc. of IEEE ICNP, November 2001.
    • (2001) P roc. of IEEE ICNP
    • Mahajan, R.1    Floyd, S.2    Wetherall, D.3
  • 26
    • 0003243896 scopus 로고    scopus 로고
    • TCP selective acknowledgement options
    • October
    • M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow. TCP selective acknowledgement options. RFC 2018, October 1996.
    • (1996) RFC
    • Mathis, M.1    Mahdavi, J.2    Floyd, S.3    Romanow, A.4
  • 27
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • April
    • J. Mirkovic and P. Reiher. A taxonomy of DDoS attacks and DDoS defense mechanisms. ACM Computer Communications Review, 34(2): 39-54, April 2004.
    • (2004) ACM Computer Communications Review , vol.34 , Issue.2 , pp. 39-54
    • Mirkovic, J.1    Reiher, P.2
  • 28
    • 0031199999 scopus 로고    scopus 로고
    • Eliminating receive livelock in an interrupt-driven kernel
    • August
    • J. Mogul and K. K. Ramakrishnan. Eliminating receive livelock in an interrupt-driven kernel. ACM Transactions on Computer Systems, 15(3):217-252, August 1997.
    • (1997) ACM Transactions on Computer Systems , vol.15 , Issue.3 , pp. 217-252
    • Mogul, J.1    Ramakrishnan, K.K.2
  • 32
    • 0032178265 scopus 로고    scopus 로고
    • Modeling TCP throughput: A simple model and its empirical validation
    • September
    • J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: A simple model and its empirical validation. In P roc. of the ACM SIGCOMM, volume 28, pages 303-314, September 1998.
    • (1998) P roc. of the ACM SIGCOMM , vol.28 , pp. 303-314
    • Padhye, J.1    Firoiu, V.2    Towsley, D.3    Kurose, J.4
  • 33
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • August
    • K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proceedings of ACM SIGCOMM, August 2001.
    • (2001) Proceedings of ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 34
  • 35
    • 84871549516 scopus 로고    scopus 로고
    • L. Rizzo, DummyNet. http://info.iet.unipi.it/~luigi/ip_dummynet/.
    • DummyNet
    • Rizzo, L.1
  • 36
    • 17744379157 scopus 로고    scopus 로고
    • Defending against low-rate TCP attacks: Dynamic detection and protection
    • Oct
    • H. Sun, J. Lui, and D. Yau. Defending against low-rate TCP attacks: Dynamic detection and protection. In Proceedings of ICNP, Oct 2004.
    • (2004) Proceedings of ICNP
    • Sun, H.1    Lui, J.2    Yau, D.3
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.