메뉴 건너뛰기




Volumn 68, Issue 4, 2008, Pages 456-470

An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently

Author keywords

DDoS attacks; Early detection; Rate limit counteraction; SYN flooding; TTL

Indexed keywords

COMPUTER SIMULATION; INTERNET PROTOCOLS; SERVERS; TELECOMMUNICATION TRAFFIC; USER INTERFACES;

EID: 39749130411     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2007.06.013     Document Type: Article
Times cited : (22)

References (27)
  • 1
    • 39749169087 scopus 로고    scopus 로고
    • S.M. Bellovin, ICMP traceback messages, Technical Report March 2000.
    • S.M. Bellovin, ICMP traceback messages, Technical Report March 2000.
  • 3
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based Distributed Denial-of-Service attacks: a tutorial
    • Chang R.K. Defending against flooding-based Distributed Denial-of-Service attacks: a tutorial. IEEE Commun. Mag. 40 10 (2002) 42-51
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.1
  • 4
    • 0036967463 scopus 로고    scopus 로고
    • C.-M. Cheng, H. Kung, K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM 2002, Taibei, China, vol. 3, 2002, pp. 2143- 2148.
    • C.-M. Cheng, H. Kung, K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM 2002, Taibei, China, vol. 3, 2002, pp. 2143- 2148.
  • 6
    • 39749183486 scopus 로고    scopus 로고
    • P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC2827, 2000 URL: 〈http://www.ietf.org/rfc/rfc2827.txt〉.
    • P. Ferguson, D. Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, RFC2827, 2000 URL: 〈http://www.ietf.org/rfc/rfc2827.txt〉.
  • 7
    • 39749083375 scopus 로고    scopus 로고
    • J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium, San Diego, California, The Internet Society, 2002.
    • J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium, San Diego, California, The Internet Society, 2002.
  • 8
    • 17644411571 scopus 로고    scopus 로고
    • C. Jin, H.N. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, New York, 2003, pp. 30-41.
    • C. Jin, H.N. Wang, K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, in: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), ACM Press, New York, 2003, pp. 30-41.
  • 9
    • 0036990601 scopus 로고    scopus 로고
    • M. Kalantari, K. Gallicchio, M. Shayman, Using transient behavior of tcp in mitigation of distributed denial of service attacks, in: Proceedings of the 41st IEEE Conference on Decision and Control 2002, vol. 2, 2002, pp. 1422-1427.
    • M. Kalantari, K. Gallicchio, M. Shayman, Using transient behavior of tcp in mitigation of distributed denial of service attacks, in: Proceedings of the 41st IEEE Conference on Decision and Control 2002, vol. 2, 2002, pp. 1422-1427.
  • 11
    • 39749151694 scopus 로고    scopus 로고
    • J. Lemon, Resisting SYN flood DoS attacks with a SYN cache, in: Proceedings of the BSDCon Conference, 2002, pp. 89-97.
    • J. Lemon, Resisting SYN flood DoS attacks with a SYN cache, in: Proceedings of the BSDCon Conference, 2002, pp. 89-97.
  • 12
    • 84904888755 scopus 로고    scopus 로고
    • J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP2002), Paris, France, IEEE Computer Society, 2002, pp. 312-321.
    • J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP2002), Paris, France, IEEE Computer Society, 2002, pp. 312-321.
  • 13
    • 85084161486 scopus 로고    scopus 로고
    • D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 9-22.
    • D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 9-22.
  • 14
    • 39749169753 scopus 로고    scopus 로고
    • Network simulator NS2 〈http://www.isi.edu/nsnam/ns/〉.
    • Network simulator NS2 〈http://www.isi.edu/nsnam/ns/〉.
  • 15
    • 0035010963 scopus 로고    scopus 로고
    • K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of the IEEE INFOCOM, 2001, pp. 338-347.
    • K. Park, H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proceedings of the IEEE INFOCOM, 2001, pp. 338-347.
  • 16
    • 0031247411 scopus 로고    scopus 로고
    • End-to-end routing behavior in the Internet
    • Paxson V. End-to-end routing behavior in the Internet. IEEE/ACM Trans. Networking 5 5 (1997) 601-615
    • (1997) IEEE/ACM Trans. Networking , vol.5 , Issue.5 , pp. 601-615
    • Paxson, V.1
  • 17
    • 0038729330 scopus 로고    scopus 로고
    • T. Peng, C. Leckie, R. Kotagiri, Protection from distributed denial of service attack using history-based IP filtering, in: Proceedings of the IEEE International Conference on Communications, Anchorage, Alaska, USA, vol. 1, 2003, pp. 482-486.
    • T. Peng, C. Leckie, R. Kotagiri, Protection from distributed denial of service attack using history-based IP filtering, in: Proceedings of the IEEE International Conference on Communications, Anchorage, Alaska, USA, vol. 1, 2003, pp. 482-486.
  • 18
    • 39749147743 scopus 로고    scopus 로고
    • J. Postel, Transmission control protocol: DARPA internet program protocol specification, RFC 793, September 1981.
    • J. Postel, Transmission control protocol: DARPA internet program protocol specification, RFC 793, September 1981.
  • 19
    • 0033650584 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2000, pp. 295-306.
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2000, pp. 295-306.
  • 20
    • 0030715989 scopus 로고    scopus 로고
    • C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service attack on TCP, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 208-223.
    • C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram, D. Zamboni, Analysis of a denial of service attack on TCP, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 1997, pp. 208-223.
  • 21
    • 0034775309 scopus 로고    scopus 로고
    • A.C. Snoeren, Hash-based IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2001, pp. 3-14.
    • A.C. Snoeren, Hash-based IP traceback, in: Proceedings of the ACM SIGCOMM Conference, ACM Press, New York, 2001, pp. 3-14.
  • 22
    • 0034997397 scopus 로고    scopus 로고
    • D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of the IEEE INFOCOM, 2001, pp. 878-886.
    • D.X. Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of the IEEE INFOCOM, 2001, pp. 878-886.
  • 23
    • 0142039750 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks
    • Sung M., and Xu J. IP traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks. IEEE Trans. Parallel Distrib. Systems 14 9 (2003) 861-872
    • (2003) IEEE Trans. Parallel Distrib. Systems , vol.14 , Issue.9 , pp. 861-872
    • Sung, M.1    Xu, J.2
  • 24
    • 85178309983 scopus 로고    scopus 로고
    • U. Tupakula, V. Varadharajan, Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture, in: Proceedings of the 11th IEEE International Conference on Networks(ICON2003), 2003, pp. 455-460.
    • U. Tupakula, V. Varadharajan, Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture, in: Proceedings of the 11th IEEE International Conference on Networks(ICON2003), 2003, pp. 455-460.
  • 25
    • 0142039747 scopus 로고    scopus 로고
    • Transport-aware IP routers: a built-in protection mechanism to counter DDoS attacks
    • Wang H., and Shin K. Transport-aware IP routers: a built-in protection mechanism to counter DDoS attacks. IEEE Trans. Parallel Distrib. Systems 14 (2003) 873-884
    • (2003) IEEE Trans. Parallel Distrib. Systems , vol.14 , pp. 873-884
    • Wang, H.1    Shin, K.2
  • 26
    • 0036343692 scopus 로고    scopus 로고
    • H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, 2002, pp. 1530-1539.
    • H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM, vol. 3, 2002, pp. 1530-1539.
  • 27
    • 3543097593 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 2004, pp. 130-143.
    • A. Yaar, A. Perrig, D. Song, SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, in: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, IEEE Computer Society Press, Silver Spring, MD, 2004, pp. 130-143.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.