메뉴 건너뛰기




Volumn 39, Issue 1, 2007, Pages

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Author keywords

Bandwidth attack; Botnet; DDoS; DNS reflector attack; DoS; Internet security; IP spoofing; IP traceback; IRC; Resource management; SYN flood; VoIP security

Indexed keywords

BANDWIDTH; COMPUTER CRIME; DATA PRIVACY; INTERNET; NETWORK PROTOCOLS; PROBLEM SOLVING; RESOURCE ALLOCATION;

EID: 34147099073     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1216370.1216373     Document Type: Review
Times cited : (584)

References (97)
  • 2
    • 34147178265 scopus 로고    scopus 로고
    • Worldwide ISP security report. Whitepaper
    • ARBOR, Lerington, MA
    • ARBOR. 2005. Worldwide ISP security report. Whitepaper. Arbor Networks, Lerington, MA.
    • (2005) Arbor Networks
  • 3
    • 47649087420 scopus 로고
    • version 4 routers. RFC, Internet Engineering Task Force IETF, Go online to
    • BAKER, F. 1995. Requirements for IP version 4 routers. RFC 1812. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
    • (1812) Requirements for IP
    • BAKER, F.1
  • 7
    • 0014814325 scopus 로고    scopus 로고
    • BLOOM, B. H. 1970. Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13, 7 (Jul.), 422-426.
    • BLOOM, B. H. 1970. Space/time tradeoffs in hash coding with allowable errors. Commun. ACM 13, 7 (Jul.), 422-426.
  • 11
    • 34147105029 scopus 로고    scopus 로고
    • CAIDA, online to
    • CAIDA. 2006. Nameserver DoS attack October 2002. Go online to http://www.caida.org/funding/dns-analysis/oct02dos.xml.
    • (2006) Nameserver DoS attack October 2002. Go
  • 16
    • 34147097571 scopus 로고    scopus 로고
    • CERT, online to
    • CERT. 2006. CERT/CC statistics. Go online to http://www.cert.org/stats/ cert_stats.html.
    • (2006) CERT/CC statistics. Go
  • 17
    • 0036804084 scopus 로고    scopus 로고
    • CHANG, R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Mag. 40, 10 (Oct.), 42-51.
    • CHANG, R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Mag. 40, 10 (Oct.), 42-51.
  • 21
    • 33144480671 scopus 로고    scopus 로고
    • Denial of service against the domain name system
    • CHEUNG, S. 2006. Denial of service against the domain name system. IEEE Sec. Pri. 4, 1, 40.
    • (2006) IEEE Sec. Pri , vol.4 , Issue.1 , pp. 40
    • CHEUNG, S.1
  • 22
    • 84967701397 scopus 로고
    • The design philosophy of the DARPA Internet protocols
    • Stanford, CA
    • CLARK, D.D. 1988. The design philosophy of the DARPA Internet protocols. In Proceedings of SIGCOMM (Stanford, CA). 106-114.
    • (1988) Proceedings of SIGCOMM , pp. 106-114
    • CLARK, D.D.1
  • 23
    • 34147119193 scopus 로고    scopus 로고
    • DAVIS, M. 2006. Building better bots: Open-source processes enable production-grade malware. Sage: Security Vision from McAfee Avert Labs 1, 1 (Jul.), 26-35.
    • DAVIS, M. 2006. Building better bots: Open-source processes enable production-grade malware. Sage: Security Vision from McAfee Avert Labs 1, 1 (Jul.), 26-35.
  • 24
    • 85025403958 scopus 로고    scopus 로고
    • DEAN, D., FHANKLIN, M., AND STUBBLEFIELD, A. 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Sec. 5, 2 (May), 119-137.
    • DEAN, D., FHANKLIN, M., AND STUBBLEFIELD, A. 2002. An algebraic approach to IP traceback. ACM Trans. Inform. Syst. Sec. 5, 2 (May), 119-137.
  • 25
    • 34147094288 scopus 로고    scopus 로고
    • DEERING, S. AND HINDEN, R. 1998. Internet protocol, version 6 (IPv6) specification. RFC 2401. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
    • DEERING, S. AND HINDEN, R. 1998. Internet protocol, version 6 (IPv6) specification. RFC 2401. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
  • 26
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2, 222-232.
    • (1987) IEEE Trans. Softw. Eng , vol.13 , Issue.2 , pp. 222-232
    • DENNING, D.E.1
  • 27
    • 85006413597 scopus 로고    scopus 로고
    • DIETRICH, S., LONG, N., AND DITTRICH, D. 2000. Analyzing distributed denial of service attack tools: The shaft case. In Proceedings of the 14th Systems Administration Conference (New Orleans, LA). 329-339.
    • DIETRICH, S., LONG, N., AND DITTRICH, D. 2000. Analyzing distributed denial of service attack tools: The shaft case. In Proceedings of the 14th Systems Administration Conference (New Orleans, LA). 329-339.
  • 28
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • EVANS, D. AND LAROCHELLE, D. 2002. Improving security using extensible lightweight static analysis. IEEE Softw. 19, 1, 42-51.
    • (2002) IEEE Softw , vol.19 , Issue.1 , pp. 42-51
    • EVANS, D.1    LAROCHELLE, D.2
  • 29
    • 34147154230 scopus 로고    scopus 로고
    • FERGUSON, P. AND SENIE, D. 2000. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
    • FERGUSON, P. AND SENIE, D. 2000. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
  • 30
    • 0027647490 scopus 로고    scopus 로고
    • FLOYD, S. AND JACOBSON, V. 1993. Random early detection gateways for congestion avoidance. IEEE / ACM Trans. Netw. 1, 4 (Aug.), 397-413.
    • FLOYD, S. AND JACOBSON, V. 1993. Random early detection gateways for congestion avoidance. IEEE / ACM Trans. Netw. 1, 4 (Aug.), 397-413.
  • 31
    • 0029356674 scopus 로고    scopus 로고
    • FLOYD, S. AND JACOBSON, V. 1995. Link-sharing and resource management models for packet networks. IEEE/ACM Trans. Netw. 3, 4 (Aug.), 365-386.
    • FLOYD, S. AND JACOBSON, V. 1995. Link-sharing and resource management models for packet networks. IEEE/ACM Trans. Netw. 3, 4 (Aug.), 365-386.
  • 32
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • FORREST, S. AND HOFMEYR, S. 1999. Architecture for an artificial immune system. Evolution. Computat. J. 7, 1, 45-68.
    • (1999) Evolution. Computat. J , vol.7 , Issue.1 , pp. 45-68
    • FORREST, S.1    HOFMEYR, S.2
  • 33
    • 34147153436 scopus 로고    scopus 로고
    • GAHBER, L. 2000. Denial-of-service attacks rip the Internet. IEEE Comput. 33, 4 (Apr.), 12-17.
    • GAHBER, L. 2000. Denial-of-service attacks rip the Internet. IEEE Comput. 33, 4 (Apr.), 12-17.
  • 35
    • 0034229418 scopus 로고    scopus 로고
    • GENG, X. AND WHINSTON, A. 2000. Defeating distributed denial of service attacks. IEEE IT Profess. 2, 4 (Jul./Aug.), 36-41.
    • GENG, X. AND WHINSTON, A. 2000. Defeating distributed denial of service attacks. IEEE IT Profess. 2, 4 (Jul./Aug.), 36-41.
  • 38
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • GLIGOR, V. D. 1984. A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng. 10, 3, 320-324.
    • (1984) IEEE Trans. Softw. Eng , vol.10 , Issue.3 , pp. 320-324
    • GLIGOR, V.D.1
  • 40
    • 33750311142 scopus 로고    scopus 로고
    • Internet subgroup report. Available online at
    • HANDLEY, M. 2005. Internet Architecture WG: DoS-resistant Internet subgroup report. Available online at http://www.communications.net/ object/download/1543/doc/mjh-dos-summary.pdf.
    • (2005) Internet Architecture WG: DoS-resistant
    • HANDLEY, M.1
  • 41
    • 0014413249 scopus 로고
    • The tragedy of the commons
    • HARDIN, G. 1968. The tragedy of the commons. Science, 1243-1248.
    • (1968) Science , pp. 1243-1248
    • HARDIN, G.1
  • 42
    • 70449669345 scopus 로고    scopus 로고
    • The Honeynet Project & Research Alliance. Feb. Go online to
    • HONEYNET. 2005. Know your enemy:tracking botnets. Whitepaper. The Honeynet Project & Research Alliance. Feb. Go online to www.honaynet.org/index.html.
    • (2005) Whitepaper, Know your enemy:tracking botnets
    • HONEYNET1
  • 43
    • 1242287724 scopus 로고    scopus 로고
    • HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. 2003. A framework for classifying denial of service attacks. In Proceedings of the ACM SIGCOMM Conference (Karlsruhe, Germany). 99-110.
    • HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. 2003. A framework for classifying denial of service attacks. In Proceedings of the ACM SIGCOMM Conference (Karlsruhe, Germany). 99-110.
  • 44
    • 84924375780 scopus 로고    scopus 로고
    • KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), (Boston, MA).
    • KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), (Boston, MA).
  • 49
  • 50
    • 0013347997 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
    • Tech. rep. 2001CRD176. GE Research & Development Center. Schectades, NY
    • KULKARNI, A., BUSH, S., AND EVANS, S. 2001. Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics. Tech. rep. 2001CRD176. GE Research & Development Center. Schectades, NY.
    • (2001)
    • KULKARNI, A.1    BUSH, S.2    EVANS, S.3
  • 53
    • 34147112403 scopus 로고    scopus 로고
    • LIPSON, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues. Special rep. CMU/SEI-2002-SR-009. CERT Coordination Center. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
    • LIPSON, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues. Special rep. CMU/SEI-2002-SR-009. CERT Coordination Center. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
  • 54
    • 4544272175 scopus 로고    scopus 로고
    • MAHAJAN, R., BELLOVIN, S. M., FLOYD, S., IOANNIDIS, J., PAXSON, V., AND SHENKER, S. 2002. Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. 32, 3 (Jul.), 62-73.
    • MAHAJAN, R., BELLOVIN, S. M., FLOYD, S., IOANNIDIS, J., PAXSON, V., AND SHENKER, S. 2002. Controlling high bandwidth aggregates in the network. ACM Comput. Commun. Rev. 32, 3 (Jul.), 62-73.
  • 55
    • 0036804085 scopus 로고    scopus 로고
    • MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag. 40, 10 (Oct.), 76-82.
    • MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag. 40, 10 (Oct.), 76-82.
  • 56
    • 34147125489 scopus 로고    scopus 로고
    • MEASUREMENT. 2005. The measurement factory DNS survey. Go online to http://dns.measurement-factory.com/surveys/sum1.html.
    • MEASUREMENT. 2005. The measurement factory DNS survey. Go online to http://dns.measurement-factory.com/surveys/sum1.html.
  • 60
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • MIHKOVIC, J. AND REIHER, P. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34, 2, 39-53.
    • (2004) ACM SIGCOMM Comput. Commun. Rev , vol.34 , Issue.2 , pp. 39-53
    • MIHKOVIC, J.1    REIHER, P.2
  • 63
    • 34147171144 scopus 로고    scopus 로고
    • MOCKAPETRIS, P. 1987b. Domain names - implementation and specification. RFC 1035, the Internet Engineering Task Force (IETF). Go online to www.ietf.org.
    • MOCKAPETRIS, P. 1987b. Domain names - implementation and specification. RFC 1035, the Internet Engineering Task Force (IETF). Go online to www.ietf.org.
  • 66
    • 0028532812 scopus 로고
    • Denial of service: An example
    • NEEDHAM, R. M. 1994. Denial of service: an example. Commun. ACM 37, 11, 42-46.
    • (1994) Commun. ACM , vol.37 , Issue.11 , pp. 42-46
    • NEEDHAM, R.M.1
  • 68
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • PARK, K. AND LEE, H. 2001a. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of IEEE INFOCOM 2001. 338-347.
    • (2001) Proceedings of IEEE INFOCOM 2001 , pp. 338-347
    • PARK, K.1    LEE, H.2
  • 69
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of router-based packet filtering for distributed DoS attack prevention in power-law Internets
    • San Diego, California, CA
    • PARK, K. AND LEE, H. 2001b. On the effectiveness of router-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of the 2001 ACM SIGCOMM Conference (San Diego, California, CA). 15-26.
    • (2001) Proceedings of the 2001 ACM SIGCOMM Conference , pp. 15-26
    • PARK, K.1    LEE, H.2
  • 70
    • 0003375670 scopus 로고    scopus 로고
    • PAXSON, V. 2001. An analysis of using reflectors for distributed denial-of-service attacks. ACM Comput. Commun. Rev. 31, 3 (Jul.), 38-47.
    • PAXSON, V. 2001. An analysis of using reflectors for distributed denial-of-service attacks. ACM Comput. Commun. Rev. 31, 3 (Jul.), 38-47.
  • 72
    • 84948180829 scopus 로고    scopus 로고
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002a. Adjusted probabilistic packet marking for IP traceback. In Proceedings of the Second IFIP Networking Conference (Networking 2002). (Pisa, Italy). 697-708.
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002a. Adjusted probabilistic packet marking for IP traceback. In Proceedings of the Second IFIP Networking Conference (Networking 2002). (Pisa, Italy). 697-708.
  • 73
    • 0141760371 scopus 로고    scopus 로고
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002b. Defending against distributed denial of service attack using selective pushback. In Proceedings of the 9th IEEE International Conference on Telecommunications (IGT 2002) (Bering, China). 411-429.
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2002b. Defending against distributed denial of service attack using selective pushback. In Proceedings of the 9th IEEE International Conference on Telecommunications (IGT 2002) (Bering, China). 411-429.
  • 74
    • 0038729330 scopus 로고    scopus 로고
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2003. Prevention from distributed denial of service attacks using history-based IP filtering. In Proceeding of the 38th IEEE International Conference on Communications (ICC 2003) (Anchorage, Alaska). 482-486.
    • PENG, T., LECKIE, C., AND R AMAMOHANARAO, K. 2003. Prevention from distributed denial of service attacks using history-based IP filtering. In Proceeding of the 38th IEEE International Conference on Communications (ICC 2003) (Anchorage, Alaska). 482-486.
  • 76
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • ROCHLIS, J. A. AND EICHIN, M. W. 1989. With microscope and tweezers: The worm from MIT's perspective. Commun. ACM 32, 6, 689-698.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 689-698
    • ROCHLIS, J.A.1    EICHIN, M.W.2
  • 83
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • SONG, D. X. AND PEHRIG, A. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM 2001. 878-886.
    • (2001) Proceedings of IEEE INFOCOM 2001 , pp. 878-886
    • SONG, D.X.1    PEHRIG, A.2
  • 85
  • 88
    • 34147146554 scopus 로고    scopus 로고
    • VAUGHN, R. AND EVRON, G. 2006. DNS amplification attacks. Go online to http://www.isotf.org/news/ DNS-Amplification-Attacks.pdf. VIXIE, P. 1999. Extension mechanisms for DNS (EDNSO). RFC 2671. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
    • VAUGHN, R. AND EVRON, G. 2006. DNS amplification attacks. Go online to http://www.isotf.org/news/ DNS-Amplification-Attacks.pdf. VIXIE, P. 1999. Extension mechanisms for DNS (EDNSO). RFC 2671. Internet Engineering Task Force (IETF). Go online to www.ietf.org.
  • 92
    • 0040911004 scopus 로고    scopus 로고
    • A survey of Web caching schemes for the internet
    • WANG, J. 1999. A survey of Web caching schemes for the internet. SIGCOMM Comput. Commun. Rev. 29, 5, 36-46.
    • (1999) SIGCOMM Comput. Commun. Rev , vol.29 , Issue.5 , pp. 36-46
    • WANG, J.1
  • 96
    • 0038404196 scopus 로고    scopus 로고
    • YAU, D. K. Y., LUI, J. C. S., AND LIANG, F. 2002. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS) (Miami Beach, FL). 35-44.
    • YAU, D. K. Y., LUI, J. C. S., AND LIANG, F. 2002. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. In Proceedings of the IEEE International Workshop on Quality of Service (IWQoS) (Miami Beach, FL). 35-44.
  • 97
    • 0141464248 scopus 로고    scopus 로고
    • HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
    • United States Military Academy, West Point, NY
    • ZHANG, Z., LI, J., MANIKOPOULOS, C., JORGENSON, J., AND UCLES, J. 2001. HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (United States Military Academy, West Point, NY).
    • (2001) Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
    • ZHANG, Z.1    LI, J.2    MANIKOPOULOS, C.3    JORGENSON, J.4    UCLES, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.