메뉴 건너뛰기




Volumn 4779 LNCS, Issue , 2007, Pages 263-280

Queue management as a DoS counter-measure?

Author keywords

Degradation of service attack; Denial of service attack; Dynamic timeout; Queue management; Timeout

Indexed keywords

NETWORK PROTOCOLS; PARAMETER ESTIMATION; QUALITY OF SERVICE; SECURITY OF DATA;

EID: 38149068278     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75496-1_18     Document Type: Conference Paper
Times cited : (13)

References (28)
  • 1
    • 1642478961 scopus 로고    scopus 로고
    • Modeling and simulation of telecommunication networks for control and management
    • Baras, J.: Modeling and simulation of telecommunication networks for control and management. In: Proc. Winter Simulation Conf. (2003)
    • (2003) Proc. Winter Simulation Conf
    • Baras, J.1
  • 3
    • 38149001587 scopus 로고    scopus 로고
    • Bernstein, D.: SYN cookies (2003), http://cr.yp.to/syncookies.html
    • Bernstein, D.: SYN cookies (2003), http://cr.yp.to/syncookies.html
  • 4
    • 0038257912 scopus 로고    scopus 로고
    • Internet traffic tends toward Poisson and independent as the load increases
    • Denison, D, Hansen, M, Holmes, C, Mallick, B, Yu, B, eds, Nonlinear estimation and Classification, Springer, Heidelberg
    • Cao, J., Cleveland, W., Lin, D., Sun, D.: Internet traffic tends toward Poisson and independent as the load increases. In: Denison, D., Hansen, M., Holmes, C., Mallick, B., Yu, B. (eds.) Nonlinear estimation and Classification. LNCS, vol. 171, pp. 83-110. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.171 , pp. 83-110
    • Cao, J.1    Cleveland, W.2    Lin, D.3    Sun, D.4
  • 5
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • IEEE Computer Society Press, Los Alamitos
    • Cheng, C.-M., Kung, H., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: Proc. IEEE Global Telecommunications Conf (GLOBECOM), pp. 2143-2148. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) Proc. IEEE Global Telecommunications Conf (GLOBECOM) , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.2    Tan, K.-S.3
  • 6
    • 38149100981 scopus 로고    scopus 로고
    • Dierks, T, Rescorla, E, The transport layer security (TLS) protocol. Version 1.1. RFC 4346 April 2006
    • Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol. Version 1.1. RFC 4346 (April 2006), http://tools.ietf.org/html/rfc4346
  • 11
    • 21644438395 scopus 로고    scopus 로고
    • An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
    • IEEE Computer Society Press, Los Alamitos
    • Hoang, X., Hu, J.: An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. In: Proc. IEEE Int. Conf. on Networks (ICON), vol. 2, pp. 470-474. IEEE Computer Society Press, Los Alamitos (2004)
    • (2004) Proc. IEEE Int. Conf. on Networks (ICON) , vol.2 , pp. 470-474
    • Hoang, X.1    Hu, J.2
  • 16
    • 0032664157 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • IEEE Computer Society Press, Los Alamitos
    • Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proc. IEEE Computer Security Foundations Work, IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) Proc. IEEE Computer Security Foundations Work
    • Meadows, C.1
  • 17
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • Meadows, C.: A cost-based framework for analysis of denial of service networks. Journal of Computer Security 9(1/2), 143-164 (2001)
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 18
    • 79959572592 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation. Security considerations for network attacks, http://www.microsoft.com/technet/security/topics/networksecurity/secdeny.mspx
    • Security considerations for network attacks
  • 20
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechar nisms
    • Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechar nisms. SIGCOMM Comput. Commun. Rev. 34(2), 39-53 (2004)
    • (2004) SIGCOMM Comput. Commun. Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 22
    • 17644427757 scopus 로고    scopus 로고
    • Alliance formation for DDoS defense. In: Proc. New Security Paradigms Work (NSPW)
    • Mirkovic, J., Robinson, M., Reiher, P.: Alliance formation for DDoS defense. In: Proc. New Security Paradigms Work (NSPW), pp. 11-18. ACM SIGSAC (2003)
    • (2003) ACM SIGSAC , pp. 11-18
    • Mirkovic, J.1    Robinson, M.2    Reiher, P.3
  • 23
    • 0037159153 scopus 로고    scopus 로고
    • A compound model for TCP connection arrivals for LAN and WAN applications
    • Nuzman, C., Saniee, I., Sweldens, W., Weiss, A.: A compound model for TCP connection arrivals for LAN and WAN applications. Comput. Networks 40(3), 319-337 (2002)
    • (2002) Comput. Networks , vol.40 , Issue.3 , pp. 319-337
    • Nuzman, C.1    Saniee, I.2    Sweldens, W.3    Weiss, A.4
  • 26
    • 26444521351 scopus 로고    scopus 로고
    • The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control
    • Technical report, Cooperative Association for Internet Data Analysis CAIDA, February
    • Shakkottai, S., Srikant, R., Brownlee, N., Broido, A., Claffy, K.: The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control. Technical report, Cooperative Association for Internet Data Analysis (CAIDA) (February 2004)
    • (2004)
    • Shakkottai, S.1    Srikant, R.2    Brownlee, N.3    Broido, A.4    Claffy, K.5
  • 27
    • 15944398256 scopus 로고    scopus 로고
    • IP-traceback based attacker tracking: A probabilistic technique for detecting Internet attacks using the concept of hidden markov models
    • IEEE Computer Society Press, Los Alamitos
    • Varanasi, R., Phoha, V., Joshi, S.: IP-traceback based attacker tracking: A probabilistic technique for detecting Internet attacks using the concept of hidden markov models. In: Proc. IEEE Information Assurance Work, IEEE Computer Society Press, Los Alamitos (2004)
    • (2004) Proc. IEEE Information Assurance Work
    • Varanasi, R.1    Phoha, V.2    Joshi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.