메뉴 건너뛰기




Volumn , Issue , 2008, Pages 397-401

A robust scheme to detect SYN flooding attacks

Author keywords

[No Author keywords available]

Indexed keywords

FLOODING ATTACKS; NON PARAMETRIC CUMULATIVE SUM ALGORITHMS;

EID: 43949089487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CHINACOM.2007.4469411     Document Type: Conference Paper
Times cited : (16)

References (15)
  • 1
    • 43949111907 scopus 로고    scopus 로고
    • CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. [Online]. Available: http://www.cert.org/advisories/CA-1996-21.html
    • CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. [Online]. Available: http://www.cert.org/advisories/CA-1996-21.html
  • 2
    • 43949104654 scopus 로고    scopus 로고
    • SYN cookies, Online, Available
    • "SYN cookies." [Online]. Available: http://cr.yp.to/syncookies. html
  • 3
    • 3042859154 scopus 로고    scopus 로고
    • Resisting SYN flood DoS attacks with a SYN cache
    • J. Lemon, "Resisting SYN flood DoS attacks with a SYN cache," in Proc. USENIX BSDCon, 2002.
    • (2002) Proc. USENIX BSDCon
    • Lemon, J.1
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7. pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 9
    • 43949112227 scopus 로고    scopus 로고
    • Online, Available
    • "Syndefender." [Online]. Available: http://www.checkpoint.com/ products/firewall-1/
    • Syndefender1
  • 10
    • 0001057057 scopus 로고    scopus 로고
    • Summary cache: A scalable wide-area web cache sharing protocol
    • L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: A scalable wide-area web cache sharing protocol," in Proc. ACM SIGCOMM, 1998.
    • (1998) Proc. ACM SIGCOMM
    • Fan, L.1    Cao, P.2    Almeida, J.3    Broder, A.Z.4
  • 11
    • 33644905483 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder and M. Mitzenmacher, 'Network applications of bloom filters: A survey," in Allerton, 2002.
    • (2002) Allerton
    • Broder, A.1    Mitzenmacher, M.2
  • 12
    • 43949126998 scopus 로고    scopus 로고
    • Online, Available
    • "Tsinghua dragonlab." [Online]. Available: http://dragonlab. org/traffic/
  • 13
    • 0031366315 scopus 로고    scopus 로고
    • Efficient hardware hashing functions for high performance computers
    • M. V. Ramakrishna, E. Fu, and E. Bahcekapili, "Efficient hardware hashing functions for high performance computers," IEEE Transactions on Computers, vol. 46, no. 12, pp. 1378-1381, 1997.
    • (1997) IEEE Transactions on Computers , vol.46 , Issue.12 , pp. 1378-1381
    • Ramakrishna, M.V.1    Fu, E.2    Bahcekapili, E.3
  • 14
    • 0003217168 scopus 로고    scopus 로고
    • Hot spares for DoS attacks
    • Online, Available
    • T. Darmohray and R. Oliver, "Hot spares for DoS attacks," Login: The Magazine of USENIX and SAGE, 2000. [Online]. Available: http://www.usenix.org/publications/login/2000-7/apropos.html
    • (2000) Login: The Magazine of USENIX and SAGE
    • Darmohray, T.1    Oliver, R.2
  • 15
    • 70449120099 scopus 로고    scopus 로고
    • A novel router-based scheme to mitigate SYN flooding DDoS attacks
    • Anchorage, Alaska, USA
    • C. Sun, J. Fan, L. Shi, and B. Liu, "A novel router-based scheme to mitigate SYN flooding DDoS attacks," in Proc. IEEE INFOCOM (Poster), Anchorage, Alaska, USA, 2007.
    • (2007) Proc. IEEE INFOCOM (Poster)
    • Sun, C.1    Fan, J.2    Shi, L.3    Liu, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.