메뉴 건너뛰기




Volumn 2, Issue 1, 2006, Pages 37-44

Protecting Web applications from DDoS attacks by an active distributed defense system

Author keywords

Active distributed defense system; Distributed Denial of Service; Network congestion; Web application

Indexed keywords

COMMERCIAL WEBSITES; DISTRIBUTED DEFENSE SYSTEMS; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; LEGITIMATE USERS; NETWORK CONGESTIONS; OVERALL NETWORKS; WEB APPLICATION;

EID: 43549088385     PISSN: 17440084     EISSN: None     Source Type: Journal    
DOI: 10.1108/17440080680000099     Document Type: Article
Times cited : (4)

References (25)
  • 1
    • 84886390769 scopus 로고    scopus 로고
    • Credit-card processor hit by DDoS attack
    • September 23
    • Arnfield, R. (2004) Credit-card processor hit by DDoS attack. News-Factor Magazine, September 23. http://www.newsfactor.com/story.xhtml?story-id=27154.
    • (2004) News-Factor Magazine
    • Arnfield, R.1
  • 3
    • 85001754530 scopus 로고    scopus 로고
    • PPDAM: Privacy preserving distributed association rule mining algorithm
    • Ashrafi, M. Z., Taniar, D. and Smith, K. A. (2005) PPDAM: Privacy preserving distributed association rule mining algorithm. Int. J. Intel. Infor. Technol. 1(1): 49-69.
    • (2005) Int. J. Intel. Infor. Technol. , vol.1 , Issue.1 , pp. 49-69
    • Ashrafi, M.Z.1    Taniar, D.2    Smith, K.A.3
  • 5
    • 84886382509 scopus 로고    scopus 로고
    • Computer emergency response team
    • CERT. Computer emergency response team. http://www.cert.org.
  • 9
    • 84886396042 scopus 로고    scopus 로고
    • A survey of software infrastructures and frameworks for ubiquitous computing
    • Endres, C.h., Butz, A. and MacWilliams, A. (2005) A survey of software infrastructures and frameworks for ubiquitous computing. Mobile Information Systems, 1(1): 41-80.
    • (2005) Mobile Information Systems , vol.1 , Issue.1 , pp. 41-80
    • Endres, Ch.1    Butz, A.2    MacWilliams, A.3
  • 10
    • 4544227726 scopus 로고    scopus 로고
    • Taking steps to secure web services
    • Geer, D. Taking steps to secure web services. IEEE Computer, 36(10): 14-16.
    • IEEE Computer , vol.36 , Issue.10 , pp. 14-16
    • Geer, D.1
  • 18
    • 84886418608 scopus 로고    scopus 로고
    • Hackers deface web sites
    • Naraine, R. and Singer, M. (2001) Hackers deface web sites; FBI issues DDoS warning. http://www.internetnews.com/dev-news/article.php/760451.
    • (2001) FBI issues DDoS Warning
    • Naraine, R.1    Singer, M.2
  • 20
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets
    • DOI 10.1145/964723.383061
    • Park, K. and Lee, H. (2001) On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet. Proc. of ACM SIGCOMM, pp. 15-26. (Pubitemid 32981951)
    • (2001) Computer Communication Review , vol.31 , Issue.4 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 21
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attack using history-based IP filtering
    • Peng, T., Christopher, L. and Kotagiri, R. (2003) Protection from distributed denial of service attack using history-based IP filtering. Proc. of IEEE ICC, pp. 482-486.
    • (2003) Proc. of IEEE ICC , pp. 482-486
    • Peng, T.1    Christopher, L.2    Kotagiri, R.3
  • 22
    • 0000783098 scopus 로고
    • Optimal detection of a change in distribution
    • Pollak, M. (1986) Optimal detection of a change in distribution. The Annals of Statistics, 13: 206-227.
    • (1986) The Annals of Statistics , vol.13 , pp. 206-227
    • Pollak, M.1
  • 23
    • 84886415379 scopus 로고    scopus 로고
    • Scalable simulation framework
    • SSFNet. Scalable simulation framework. http://www.ssfnet.org.
  • 25
    • 28844439716 scopus 로고    scopus 로고
    • A survey of active and passive defence mechanisms against DDoS attacks.K
    • School of Information Technology, Deakin University, Australia
    • Xiang, Y., Zhou, W. and Chowdhury, M. (2004) A survey of active and passive defence mechanisms against DDoS attacks.k Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia.
    • (2004) Technical Report, TR C04/02
    • Xiang, Y.1    Zhou, W.2    Chowdhury, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.