메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Identification of repeated denial of service attacks

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET SERVICE PROVIDERS; PACKET NETWORKS;

EID: 39049161433     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2006.126     Document Type: Conference Paper
Times cited : (36)

References (32)
  • 4
    • 39049111285 scopus 로고    scopus 로고
    • kc Claffy, G Miller, and K Thompson. The nature of the beast: Recent traffic measurements from an internet backbone. http://www.caida.org/outreach/ resources/learn/packetsize, April 1998.
    • kc Claffy, G Miller, and K Thompson. The nature of the beast: Recent traffic measurements from an internet backbone. http://www.caida.org/outreach/ resources/learn/packetsize, April 1998.
  • 5
    • 39049119539 scopus 로고    scopus 로고
    • United States Code. Fraud and related activity in connection with computers. USC, Title 18, Part I, Chapter 47, Section 1030
    • United States Code. Fraud and related activity in connection with computers. USC, Title 18, Part I, Chapter 47, Section 1030.
  • 8
    • 33747578143 scopus 로고    scopus 로고
    • Dynamics of IP traffic: A study of the role of variability and the impact of control
    • Anja Feldmann, Anna C. Gilbert, Polly Huang, and Walter Willinger. Dynamics of IP traffic: a study of the role of variability and the impact of control. SIGCOMM Comput. Commun. Rev., 29(4):301-313, 1999.
    • (1999) SIGCOMM Comput. Commun. Rev , vol.29 , Issue.4 , pp. 301-313
    • Feldmann, A.1    Gilbert, A.C.2    Huang, P.3    Willinger, W.4
  • 9
    • 39049084998 scopus 로고    scopus 로고
    • Empirical and theoretical evaluation of active probing attacks and their countermeasures
    • Toronto, Canada, May
    • Xinwen Fu, B Graham, D Xuan, R Bettati, and Wei Zhao. Empirical and theoretical evaluation of active probing attacks and their countermeasures. In 6th Information Hiding Workshop, Toronto, Canada, May 2004.
    • (2004) 6th Information Hiding Workshop
    • Fu, X.1    Graham, B.2    Xuan, D.3    Bettati, R.4    Zhao, W.5
  • 10
    • 84888856651 scopus 로고    scopus 로고
    • Internet packet size samples
    • Nanog: North American Network Operators Group. Internet packet size samples. http://www.merit.edu/mail.archives/nanog/2000-07/msg00691.html.
    • North American Network Operators Group
    • Nanog1
  • 12
  • 13
    • 39049154066 scopus 로고    scopus 로고
    • Identification of Repeated Denial of Service Attacks. Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, February
    • Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated Denial of Service Attacks. Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, February 2005.
    • (2005)
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 15
    • 84878210701 scopus 로고    scopus 로고
    • Purushotham Kamath, Kun Chan Lan, John Heidemann, Joe Bannister, and Joe Touch. Generation of high bandwidth network traffic traces. In In Proceedings of MASCOTS, pages 401-410, Fort Worth, Texas, USA, October 2002. IEEE.
    • Purushotham Kamath, Kun Chan Lan, John Heidemann, Joe Bannister, and Joe Touch. Generation of high bandwidth network traffic traces. In In Proceedings of MASCOTS, pages 401-410, Fort Worth, Texas, USA, October 2002. IEEE.
  • 16
    • 4143128192 scopus 로고    scopus 로고
    • Inferring congestion sharing and path characteristics for packet interarrival times
    • Technical report, MIT-LCS, 2001
    • Dina Katabi and Charles Blake. Inferring congestion sharing and path characteristics for packet interarrival times. Technical report, MIT-LCS, 2001.
    • Katabi, D.1    Blake, C.2
  • 21
    • 84942417880 scopus 로고    scopus 로고
    • Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, and Ramesh Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In In Proceeding of Discex III, Washington, DC, USC, April 2003.
    • Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, and Ramesh Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In In Proceeding of Discex III, Washington, DC, USC, April 2003.
  • 23
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Decemeber
    • Vera Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, Decemeber 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 29
    • 39049118106 scopus 로고    scopus 로고
    • BBC Online Technology. DDoS extortion in the uk gambling industry. http://news.bbc.co.uk/1/hit/technology/3549883.htm, March 2004.
    • BBC Online Technology. DDoS extortion in the uk gambling industry. "http://news.bbc.co.uk/1/hit/technology/3549883.htm", March 2004.
  • 30
    • 39049119091 scopus 로고    scopus 로고
    • Los Angeles Times. Deleting Online Extortion. http://www.latimes. com/business/la-fi-extort25oct25,1,5030182.story?coll=la-home-headlines, October 2004.
    • Los Angeles Times. Deleting Online Extortion. "http://www.latimes. com/business/la-fi-extort25oct25,1,5030182.story?coll=la-home-headlines", October 2004.
  • 31
    • 39049129955 scopus 로고    scopus 로고
    • Tripwire. http://www.tripwire.com.
    • Tripwire


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.