메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 2165-2170

A coordinated detection and response scheme for distributed denial-of-service attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; INTERNET; RESOURCE ALLOCATION; SERVERS;

EID: 42549129280     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255091     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 1
    • 42549147029 scopus 로고    scopus 로고
    • Arbor Networks, Worldwide ISP security report, Sept. 2005. [Online]. Available: http://www.arbor.net/downloads/Arbor.Worldwide. ISP.Security.Report.pdf
    • Arbor Networks, "Worldwide ISP security report," Sept. 2005. [Online]. Available: http://www.arbor.net/downloads/Arbor.Worldwide. ISP.Security.Report.pdf
  • 4
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • April
    • D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. of the IEEE INFOCOM '01, vol. 2, April 2001, pp. 878-886.
    • (2001) Proc. of the IEEE INFOCOM '01 , vol.2 , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 6
    • 3543126644 scopus 로고    scopus 로고
    • Large-scale IP traceback in high-speed internet: Practical techniques and theoretical foundation
    • May
    • J. Li, M. Sung, J. Xu, and L. Li, "Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation," in Proc. of the 2004 IEEE Symp. on Security and Privacy, May 2004, pp. 115-129.
    • (2004) Proc. of the 2004 IEEE Symp. on Security and Privacy , pp. 115-129
    • Li, J.1    Sung, M.2    Xu, J.3    Li, L.4
  • 7
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • April
    • K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," in Proc. of the IEEE INFOCOM '01, vol. 1, April 2001, pp. 338-347.
    • (2001) Proc. of the IEEE INFOCOM '01 , vol.1 , pp. 338-347
    • Park, K.1    Lee, H.2
  • 10
    • 84904907549 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
    • Nov
    • M. Sung and J. Xu, "IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks," in Proc. of 10th IEEE International Conference on Network Protocols, Nov 2002, pp. 302-311.
    • (2002) Proc. of 10th IEEE International Conference on Network Protocols , pp. 302-311
    • Sung, M.1    Xu, J.2
  • 14
    • 0003552333 scopus 로고    scopus 로고
    • Controlling high bandwidth aggregates in the network,
    • Technical Report, AT&T Center for Internet Research at ICSI, July
    • R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high bandwidth aggregates in the network," Technical Report, AT&T Center for Internet Research at ICSI, July 2001.
    • (2001)
    • Mahajan, R.1    Bellovin, S.M.2    Floyd, S.3    Ioannidis, J.4    Paxson, V.5    Shenker, S.6
  • 15
    • 0038404196 scopus 로고    scopus 로고
    • D. K. Y. Yau, J. C. S. Lui, and F. Liang, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, in Proc. of the IEEE International Workshop on Quality of Service, May 2002, pp. 35-44.
    • D. K. Y. Yau, J. C. S. Lui, and F. Liang, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," in Proc. of the IEEE International Workshop on Quality of Service, May 2002, pp. 35-44.
  • 16
    • 33745278421 scopus 로고    scopus 로고
    • K. K. K. Wan and R. K. C. Chang, Engineering of a global defense infrastructure for DDoS attacks, in Proc. of the IEEE International Conference on Networks, Aug 2002, pp. 419-427.
    • K. K. K. Wan and R. K. C. Chang, "Engineering of a global defense infrastructure for DDoS attacks," in Proc. of the IEEE International Conference on Networks, Aug 2002, pp. 419-427.
  • 21
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 22
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • August
    • T. Gil and M. Poleto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. of the 10th Usenix Security Symposium, August 2001, pp. 23-28.
    • (2001) Proc. of the 10th Usenix Security Symposium , pp. 23-28
    • Gil, T.1    Poleto, M.2
  • 25
    • 42549090139 scopus 로고    scopus 로고
    • H. Lam, C. Li, S. Chanson, and D. Yeung, A coordinated detection and response scheme for distributed denial-of-service attacks, Department of Computer Science, Hong Kong University of Science and Technology, Tech. Rep. Technical Report HKUST-CS06-01, March 2006, ftp://ftp.es.ust.hk/pub/techreport/ 06/tr06-01.pdf.
    • H. Lam, C. Li, S. Chanson, and D. Yeung, "A coordinated detection and response scheme for distributed denial-of-service attacks," Department of Computer Science, Hong Kong University of Science and Technology, Tech. Rep. Technical Report HKUST-CS06-01, March 2006, ftp://ftp.es.ust.hk/pub/techreport/ 06/tr06-01.pdf.
  • 27
    • 42549118554 scopus 로고    scopus 로고
    • L. N. R. Group. (1997, Sept.) UCB/LBNL/VINT network simulator-ns (version 2). [Online]. Available: http://www-mash.cs.berkeley.edu/ns/
    • L. N. R. Group. (1997, Sept.) UCB/LBNL/VINT network simulator-ns (version 2). [Online]. Available: http://www-mash.cs.berkeley.edu/ns/
  • 28
    • 42549145474 scopus 로고    scopus 로고
    • MAWI working group traffic archive. [Online]. Available: http: //tracer.csl.sony.co.jp/mawi
    • MAWI working group traffic archive. [Online]. Available: http: //tracer.csl.sony.co.jp/mawi


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.