메뉴 건너뛰기




Volumn 18, Issue 5, 2007, Pages 577-588

A divide-and-conquer strategy for thwarting distributed denial-of-service attacks

Author keywords

Network level security and protection

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES; INTERNET; PACKET NETWORKS; ROUTERS; SIGNAL FILTERING AND PREDICTION; TELECOMMUNICATION TRAFFIC; TOPOLOGY;

EID: 34247601459     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.1014     Document Type: Article
Times cited : (46)

References (44)
  • 2
    • 0036804084 scopus 로고    scopus 로고
    • Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
    • Oct
    • R.K.C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Comm. Magazine, vol. 40, no. 10, pp. 42-51, Oct. 2002.
    • (2002) IEEE Comm. Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 5
    • 33748357746 scopus 로고    scopus 로고
    • Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources
    • Oct
    • R. Chen and J.-M. Park, "Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources," Proc. IEEE Int'l Conf. Computer Comm. and Networks (ICCCN), pp. 275-280, Oct. 2005.
    • (2005) Proc. IEEE Int'l Conf. Computer Comm. and Networks (ICCCN) , pp. 275-280
    • Chen, R.1    Park, J.-M.2
  • 6
    • 21244446746 scopus 로고    scopus 로고
    • Perimeter-Based Defense against High Bandwidth DDoS Attacks
    • June
    • S. Chen and Q. Song, "Perimeter-Based Defense against High Bandwidth DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 6, pp. 526-537, June 2005.
    • (2005) IEEE Trans. Parallel and Distributed Systems , vol.16 , Issue.6 , pp. 526-537
    • Chen, S.1    Song, Q.2
  • 8
    • 1242321281 scopus 로고    scopus 로고
    • DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art
    • Apr
    • C. Douligeris and A. Mitrokotsa, "DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art," Computer Networks, vol. 44, no. 5, pp. 643-666, Apr. 2004.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 9
    • 25644445353 scopus 로고    scopus 로고
    • Design and Implementation of Network Puzzles
    • Mar
    • W. Feng, E. Kaiser, and A. Luu, "Design and Implementation of Network Puzzles," Proc. IEEE INFOCOM, pp. 2372-2382, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM , pp. 2372-2382
    • Feng, W.1    Kaiser, E.2    Luu, A.3
  • 12
    • 3543119176 scopus 로고    scopus 로고
    • Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
    • Apr
    • V.D. Gligor, "Guaranteeing Access in Spite of Distributed Service-Flooding Attacks," Proc. Security Protocols Workshop, pp. 66-74, Apr. 2003.
    • (2003) Proc. Security Protocols Workshop , pp. 66-74
    • Gligor, V.D.1
  • 14
    • 84861587712 scopus 로고    scopus 로고
    • Client Puzzle: A Cryptographic Defense against Connection Depletion Attacks
    • Feb
    • A. Juels and J. Brainard, "Client Puzzle: A Cryptographic Defense against Connection Depletion Attacks," Proc. Network and Distributed System Security Symp., pp. 151-165, Feb. 1999.
    • (1999) Proc. Network and Distributed System Security Symp , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 17
    • 25844469597 scopus 로고    scopus 로고
    • You Can Run, but You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
    • Sept
    • T.K.T. Law, J.C.S. Lui, and D.K.Y. Yau, "You Can Run, but You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 9, pp. 799-813, Sept. 2005.
    • (2005) IEEE Trans. Parallel and Distributed Systems , vol.16 , Issue.9 , pp. 799-813
    • Law, T.K.T.1    Lui, J.C.S.2    Yau, D.K.Y.3
  • 18
    • 3543126644 scopus 로고    scopus 로고
    • Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
    • May
    • J. Li, M. Sung, J. Xu, and L. Li, "Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation," Proc. IEEE Symp. Security and Privacy, pp. 115-129, May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 115-129
    • Li, J.1    Sung, M.2    Xu, J.3    Li, L.4
  • 24
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
    • Apr
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 2, pp. 39-54, Apr. 2004.
    • (2004) ACM SIGCOMM Computer Comm. Rev , vol.34 , Issue.2 , pp. 39-54
    • Mirkovic, J.1    Reiher, P.2
  • 25
    • 34247555700 scopus 로고    scopus 로고
    • Distributed Denial of Service Incident Handling: Real-Time Inter-Network Defense
    • work in progress, Feb
    • K.M. Moriarty, "Distributed Denial of Service Incident Handling: Real-Time Inter-Network Defense," IETF Internet draft, work in progress, Feb. 2004.
    • (2004) IETF Internet draft
    • Moriarty, K.M.1
  • 26
    • 0034776786 scopus 로고    scopus 로고
    • On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets
    • Aug
    • K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM, pp. 15-26, Aug. 2001.
    • (2001) Proc. ACM SIGCOMM , pp. 15-26
    • Park, K.1    Lee, H.2
  • 29
    • 34247575982 scopus 로고    scopus 로고
    • Skitter
    • Cooperative Assoc. for Internet Data Analysis
    • "Skitter," http://www.caida.org/tools/measurement/skitter/ index.xml, Cooperative Assoc. for Internet Data Analysis, 2006.
    • (2006)
  • 31
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • Apr
    • D.X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM, pp. 878-886, Apr. 2001.
    • (2001) Proc. IEEE INFOCOM , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 32
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP Overlay Network for Tracking DoS Floods
    • July
    • R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods," Proc. USENIX Security Symp., pp. 199-212, July 2000.
    • (2000) Proc. USENIX Security Symp , pp. 199-212
    • Stone, R.1
  • 33
    • 0142039750 scopus 로고    scopus 로고
    • IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks
    • Sept
    • M. Sung and J. Xu, "IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 9, pp. 861-872, Sept. 2003.
    • (2003) IEEE Trans. Parallel and Distributed Systems , vol.14 , Issue.9 , pp. 861-872
    • Sung, M.1    Xu, J.2
  • 36
    • 0142039747 scopus 로고    scopus 로고
    • Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks
    • Sept
    • H. Wang and K.G. Shin, "Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 9, pp. 873-884, Sept. 2003.
    • (2003) IEEE Trans. Parallel and Distributed Systems , vol.14 , Issue.9 , pp. 873-884
    • Wang, H.1    Shin, K.G.2
  • 37
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining Availability of Web Services under Distributed Denial of Service Attacks
    • Feb
    • J. Xu and W. Lee, "Sustaining Availability of Web Services under Distributed Denial of Service Attacks," IEEE Trans. Computers, vol. 52, no. 2, pp. 195-208, Feb. 2003.
    • (2003) IEEE Trans. Computers , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 38
    • 15544363902 scopus 로고    scopus 로고
    • Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles
    • Feb
    • D.K.Y. Yau, J.C.S. Lui, F. Liang, and Y. Yam, "Defending against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," IEEE/ACM Trans. Networking, pp. 29-42, Feb. 2005.
    • (2005) IEEE/ACM Trans. Networking , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4
  • 39
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A Path Identification Mechanism to Defend against DDoS Attacks
    • May
    • A. Yaar, A. Perrig, and D. Song, "Pi: A Path Identification Mechanism to Defend against DDoS Attacks," Proc. IEEE Symp. Security and Privacy, pp. 93-107, May 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 93-107
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 40
    • 3543059601 scopus 로고    scopus 로고
    • StackPi: A New Defensive Mechanism against IP Spoofing and DDoS Attacks
    • Technical Report CMU-CS-02-208, Carnegie Mellon Univ, Feb
    • A. Yaar, A. Perrig, and D. Song, "StackPi: A New Defensive Mechanism against IP Spoofing and DDoS Attacks," Technical Report CMU-CS-02-208, Carnegie Mellon Univ., Feb. 2003.
    • (2003)
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 41
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks
    • May
    • A. Yaar, A. Perrig, and D. Song, "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp. Security and Privacy, pp. 130-143, May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 130-143
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 42
    • 25844461391 scopus 로고    scopus 로고
    • FIT: Fast Internet Traceback
    • Mar
    • A. Yaar, A. Perrig, and D. Song, "FIT: Fast Internet Traceback," Proc. IEEE INFOCOM, pp. 1395-1406, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM , pp. 1395-1406
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.