메뉴 건너뛰기




Volumn 51, Issue 10, 2007, Pages 2753-2770

Improving the resilience of content distribution networks to large scale distributed denial of service attacks

Author keywords

Content distribution networks; Distributed Denial of Service attacks; Hash based request routing; Network security; Service level guarantee; Site allocation using binary codes

Indexed keywords

ALGORITHMS; BINARY CODES; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; QUALITY OF SERVICE; USER INTERFACES; WEBSITES;

EID: 34247553674     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.11.025     Document Type: Article
Times cited : (14)

References (35)
  • 1
    • 34247568632 scopus 로고    scopus 로고
    • P. Ferguson, D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing (RFC 2827), Internet Request for Comments (May 2000).
  • 2
    • 34247574930 scopus 로고    scopus 로고
    • Kihong Park, Heejo Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, 2001.
  • 3
    • 34247614236 scopus 로고    scopus 로고
    • Strategies to protect against distributed denial of service (DDoS) attacks, Cisco Systems White Paper. http://www.cisco.com/warp/public/707/newsflash.html (February 2000).
  • 4
    • 85034043506 scopus 로고    scopus 로고
    • F. Kargl, J. Maier, M. Weber, Protecting web servers from distributed denial of service attacks, in: Proceedings of WWW, 2001.
  • 5
    • 34247578343 scopus 로고    scopus 로고
    • D.J. Bernstein, SYN cookies. http://cr.yp.to/syncookies.html (November 2001).
  • 6
    • 34247635874 scopus 로고    scopus 로고
    • Jupiter Media Metrix, US top 50 web and digital media properties. http://www.jmm.com/xp/jmm/press/mediaMetrixTop50.xml (October 2001).
  • 7
    • 77953077374 scopus 로고    scopus 로고
    • J. Jung, B. Krishnamurthy, M. Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites, in: Proceedings of 11th WWW Conference, 2002.
  • 8
    • 34247592152 scopus 로고    scopus 로고
    • V.P. Limin Wang, L. Peterson, The effectiveness of request redirection on CDN robustness, in: Proceedings of USENIX Symposium on Operating Systems Design and Implementation, 2002.
  • 9
    • 1542330203 scopus 로고    scopus 로고
    • B. Krishnamurthy, C. Wills, Y. Zhang, On the use and performance of content distribution networks, in: Proceedings of ACM SIGCOMM Internet Measurement Workshop, 2001.
  • 10
    • 34247583584 scopus 로고    scopus 로고
    • IBM e-Business Hosting. http://www.ibm.com/services/webhosting (July 2002).
  • 11
    • 34247587881 scopus 로고    scopus 로고
    • A. Barbir et al., Known CDN request-routing mechanisms, Internet Draft (draft-ietf-cdi-known-request-routing-00.txt) (February 2002).
  • 12
    • 0035007461 scopus 로고    scopus 로고
    • A. Shaikh, R. Tewari, M. Agrawal, On the effectiveness of DNS-based server selection, in: Proceedings of IEEE INFOCOM, 2001.
  • 13
    • 85084163276 scopus 로고    scopus 로고
    • Z.M. Mao, C.D. Cranor, F. Douglis, M. Rabinovich, O. Spatscheck, J. Wang, A precise and efficient evaluation of the proximity between web clients and their local DNS servers, in: Proceedings of USENIX Annual Technical Conference, 2002.
  • 15
    • 85084161486 scopus 로고    scopus 로고
    • David Moore, Geoffrey M. Voelker, Stefan Savage, Inferring internet denial-of-service attack, in: Proceedings of USENIX Security Symposium, 2001.
  • 16
    • 34247559352 scopus 로고    scopus 로고
    • CERT Coordination Center, Denial of service attacks, CERT Tech Tips. http://www.cert.org/tech_tips/denial_of_service.html (June 2001).
  • 17
    • 34247616503 scopus 로고    scopus 로고
    • Web attacks? the ISPs strike back!, ZDNet News. http://zdnet.com.com/2100-11-518743.html?legacy=zdnn (February 2000).
  • 18
    • 34247589931 scopus 로고    scopus 로고
    • Akamai Technologies. http://www.akamai.com.
  • 19
    • 34247628662 scopus 로고    scopus 로고
    • Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer, Hash-based IP traceback, in: Proceedings of ACM SIGCOMM, 2001.
  • 20
    • 34247598579 scopus 로고    scopus 로고
    • Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000.
  • 21
    • 34247630827 scopus 로고    scopus 로고
    • CERT Coordination Center, Code Red worm exploiting buffer overflow in IIS indexing service DLL, CERT Advisory CA-2001-19. http://www.cert.org/advisories/CA-2001-19.html (July 2001).
  • 22
    • 34247575443 scopus 로고    scopus 로고
    • Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keyed hash functions for message authentication, in: Proceedings of CRYPTO, 1996.
  • 23
    • 25844461391 scopus 로고    scopus 로고
    • A.P. Abraham Yaar, D. Song, FIT: fast internet traceback, in: Proceedings of IEEE INFOCOM, 2005.
  • 24
    • 0034997397 scopus 로고    scopus 로고
    • D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of IEEE INFOCOM, 2001.
  • 25
    • 34247573669 scopus 로고    scopus 로고
    • Hugo Krawczyk, LFSR-based hashing and authentication, in: Proceedings of CRYPTO, 1994.
  • 26
    • 0003071666 scopus 로고    scopus 로고
    • Httperf: a tool for measuring web server performance
    • Mosberger D., and Jin T. Httperf: a tool for measuring web server performance. ACM Performance Evaluation Review 26 3 (1998)
    • (1998) ACM Performance Evaluation Review , vol.26 , Issue.3
    • Mosberger, D.1    Jin, T.2
  • 28
    • 0004247960 scopus 로고    scopus 로고
    • Pless V., and Huffman W. (Eds), Elsevier, Amsterdam
    • In: Pless V., and Huffman W. (Eds). Handbook of Coding Theory (1998), Elsevier, Amsterdam
    • (1998) Handbook of Coding Theory
  • 30
    • 85011016678 scopus 로고    scopus 로고
    • H. Burch, B. Cheswick, Tracing anonymous packets to their approximate source, in: Proceedings of USENIX Systems Administration Conference (LISA), 2000.
  • 31
    • 34247599532 scopus 로고    scopus 로고
    • G. Sager, Security fun with OCxmon and cflowd, Presentation to Internet-2 Measurement Working Group. http://www.caida.org/projects/ngi/content/security/1198/ (November 1998).
  • 32
    • 34247643610 scopus 로고    scopus 로고
    • S.M. Bellovin, M.D. Leech, T. Taylor, Internet draft (draft-ietf-itrace-01.txt) (April 2002).
  • 33
    • 85084163540 scopus 로고    scopus 로고
    • R. Stone, CenterTrack: an IP overlay network for tracking DoS floods, in: Proceedings of USENIX Security Symposium, 2000.
  • 34
    • 34247624300 scopus 로고    scopus 로고
    • CERT Coordination Center, TCP SYN flooding and IP spoofing attacks, CERT Advisory CA-1996-21. http://www.cert.org/advisories/CA-1996-21.html (September 1996).
  • 35
    • 34247640427 scopus 로고    scopus 로고
    • Sun Microsystems Security Bulletin #00136. http://sunsolve.sun.com/security (October 1996).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.