메뉴 건너뛰기




Volumn , Issue , 2007, Pages 857-865

Reduction of Quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs

Author keywords

Denial of service; Load balancing; Performance evaluation; Security

Indexed keywords

COMPUTER SIMULATION; INTERNET; OPTIMIZATION; PUBLIC POLICY; QUEUEING NETWORKS; RESOURCE ALLOCATION;

EID: 34548297939     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2007.105     Document Type: Conference Paper
Times cited : (30)

References (34)
  • 2
    • 84886577977 scopus 로고    scopus 로고
    • Based Load Balancing
    • Akamai. Performance Based Load Balancing, http://www.akamai.com/en/html/ services/gtm_how_it_works.html.
    • Performance
    • Akamai1
  • 3
    • 34548341250 scopus 로고    scopus 로고
    • A. Allen. Probability, Statistics and Queueing Theory with Computer Science Applications. Second Edition, Academic Press
    • A. Allen. Probability, Statistics and Queueing Theory with Computer Science Applications. Second Edition, Academic Press.
  • 6
    • 34548352312 scopus 로고    scopus 로고
    • CERT Coordination Center. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories/CA-1996-21.html. Original issue date: September 19, 1996.
    • CERT Coordination Center. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories/CA-1996-21.html. Original issue date: September 19, 1996.
  • 7
    • 4143130116 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center. Denial of Service Attacks, http://www.cert.org/ tech_tips/denial_of_service.html.
    • Denial of Service Attacks
  • 9
    • 0033722797 scopus 로고    scopus 로고
    • FLEX: Load Balancing and Management Strategy for Scalable Web Hosting Service
    • Jul
    • L. Cherkasova. FLEX: Load Balancing and Management Strategy for Scalable Web Hosting Service. In Proceedings of ISCC, Jul 2000.
    • (2000) Proceedings of ISCC
    • Cherkasova, L.1
  • 10
    • 72949094868 scopus 로고    scopus 로고
    • Distributed Network Storage Service with Quality-of-Service Guarantees
    • San Jose, CA, June
    • J. Chuang. Distributed Network Storage Service with Quality-of-Service Guarantees. In Proceedings of Internet Society INET'99, San Jose, CA, June 1999.
    • (1999) Proceedings of Internet Society INET'99
    • Chuang, J.1
  • 12
    • 84928414144 scopus 로고    scopus 로고
    • Cisco. LocalDirector. http://www.cisco.com/warp/public/cc/pd/cxsr/400/ index.shtml.
    • LocalDirector
    • Cisco1
  • 15
    • 0033873349 scopus 로고    scopus 로고
    • Internet traffic engineering by optimizing OSPF weights
    • B. Fortz and M. Thorup. Internet traffic engineering by optimizing OSPF weights. In Proceedings of IEEE INFOCOM, 2000.
    • (2000) Proceedings of IEEE INFOCOM
    • Fortz, B.1    Thorup, M.2
  • 16
    • 17744369470 scopus 로고    scopus 로고
    • Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources
    • Oct
    • M. Guirguis, A. Bestavros, and I. Matta. Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. In Proceedings of the ICNP, Oct 2004.
    • (2004) Proceedings of the ICNP
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3
  • 18
    • 34548346336 scopus 로고    scopus 로고
    • IBM. DB2 connection routing using Linux load balancing, http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0410wri ght/.
    • IBM. DB2 connection routing using Linux load balancing, http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0410wright/.
  • 20
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds
    • Boston, MA, May
    • S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds. In Proceedings of NSDI, Boston, MA, May 2005.
    • (2005) Proceedings of NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 21
    • 84976815794 scopus 로고
    • Processor Sharing Queueing Models of Mixed Scheduling Disciplines for Time Shared System
    • L. Kleinrock and R. Muntz. Processor Sharing Queueing Models of Mixed Scheduling Disciplines for Time Shared System. Journal of the ACM, 1972.
    • (1972) Journal of the ACM
    • Kleinrock, L.1    Muntz, R.2
  • 22
    • 34548327721 scopus 로고    scopus 로고
    • A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). In Proceedings of ACM SIGCOMM, karlsruhe , Germany, August 2003.
    • A. Kuzmanovic and E. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). In Proceedings of ACM SIGCOMM, karlsruhe , Germany, August 2003.
  • 25
    • 0032664157 scopus 로고    scopus 로고
    • C. Meadows. A Formal Framework and Evaluation Method for Network Denial of Service. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.
    • C. Meadows. A Formal Framework and Evaluation Method for Network Denial of Service. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.
  • 27
    • 34548342359 scopus 로고    scopus 로고
    • Microsoft. SharePoint Services, http://www.microsoft.com/resources/ documentation/wss/2/all/adminguide/en-us/stsf15.mspx.
    • Microsoft. SharePoint Services
  • 28
    • 34548347402 scopus 로고    scopus 로고
    • mini_httpd: small HTTP server, http://acme.com/software/mini_httpd.
    • mini_httpd: small HTTP server, http://acme.com/software/mini_httpd.
  • 29
    • 1642283261 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
    • Technical Report 020018, Computer Science Department, University of California, Los Angeles
    • J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report 020018, Computer Science Department, University of California, Los Angeles.
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 30
    • 0003458937 scopus 로고
    • Network behavior of a busy Web server and its clients
    • 95/5, DEC Western Research Laboratory, Oct
    • J. Mogul. Network behavior of a busy Web server and its clients. Research Report 95/5, DEC Western Research Laboratory, Oct 1995.
    • (1995) Research Report
    • Mogul, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.