메뉴 건너뛰기




Volumn , Issue , 2007, Pages 13-18

DDoS attacks by subverting membership management in P2P systems

Author keywords

[No Author keywords available]

Indexed keywords

DDOS ATTACKS; FUNDAMENTAL DESIGNS; IP ADDRESSES; LOGICAL IDENTIFIER; MEMBERSHIP INFORMATION; MEMBERSHIP MANAGEMENT; P2P SYSTEMS; PEER TO PEER SYSTEMS (P2P); PEER-TO-PEER (P2P) SYSTEMS; SECURE NETWORK PROTOCOLS;

EID: 47249122258     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPSEC.2007.4371618     Document Type: Conference Paper
Times cited : (15)

References (27)
  • 4
    • 33847636533 scopus 로고    scopus 로고
    • The impact and implications of the growth in residential user-to-user traffic
    • K. Cho, K. Fukuda, and H. Esaki, ""The impact and implications of the growth in residential user-to-user traffic"," in Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Cho, K.1    Fukuda, K.2    Esaki, H.3
  • 8
    • 34547492967 scopus 로고    scopus 로고
    • A. Singh, T.-W. Ngan, D. P, and D. Wallach, Eclipse Attacks on Overlays: Threats and Defenses, in Proceedings of INFOCOM 2006, April 2006.
    • A. Singh, T.-W. Ngan, D. P, and D. Wallach, "Eclipse Attacks on Overlays: Threats and Defenses," in Proceedings of INFOCOM 2006, April 2006.
  • 10
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • July
    • V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), July 2001."
    • (2001) Computer Communication Review , vol.31 , Issue.3
    • Paxson, V.1
  • 12
    • 47249161637 scopus 로고    scopus 로고
    • EMule, http://www.emule-project.net.
    • EMule
  • 15
    • 84871950357 scopus 로고    scopus 로고
    • BitTorrent, http://www.bittorrent.org.
    • BitTorrent
  • 16
    • 21644459146 scopus 로고    scopus 로고
    • DONet/CoolStreaming: A Data-driven Overlay Network for Live Media Streaming
    • X. Zhang, J. Liu, B. Li, and T.-S. P. Yum, "DONet/CoolStreaming: A Data-driven Overlay Network for Live Media Streaming," in Proceedings of IEEE INFOCOM, 2005.
    • (2005) Proceedings of IEEE INFOCOM
    • Zhang, X.1    Liu, J.2    Li, B.3    Yum, T.-S.P.4
  • 19
    • 0037453341 scopus 로고    scopus 로고
    • D. Malkhi, Y. Mansour, and M. Reiter, Diffusing without false rumors: On propagating updates in a byzantine environment, Theoretical Computer Science, 299, no. (1-3), pp. 289-306, 2003.
    • D. Malkhi, Y. Mansour, and M. Reiter, "Diffusing without false rumors: On propagating updates in a byzantine environment," Theoretical Computer Science, vol. 299, no. (1-3), pp. 289-306, 2003.
  • 20
    • 0037303962 scopus 로고    scopus 로고
    • Tolerating malicious gossip
    • February
    • Y. Minsky and F. Schneider, "Tolerating malicious gossip," Distributed Computing, vol. 16, no. 1, pp. 49-68, February 2003.
    • (2003) Distributed Computing , vol.16 , Issue.1 , pp. 49-68
    • Minsky, Y.1    Schneider, F.2
  • 21
    • 47249154859 scopus 로고    scopus 로고
    • Preventing DDoS Attacks with P2P Systems through Robust Membership Management,
    • Tech. Rep
    • X. Sun, R. Torres, and S. Rao, "Preventing DDoS Attacks with P2P Systems through Robust Membership Management," Tech. Rep., 2007.
    • (2007)
    • Sun, X.1    Torres, R.2    Rao, S.3
  • 23
    • 84876215464 scopus 로고    scopus 로고
    • BotTorrent: Misusing BitTorrent to launch DDoS attacks
    • K. E. Defrawy, M. Gjoka, and A. Markopoulou, ""BotTorrent: Misusing BitTorrent to launch DDoS attacks"," in Usenix SRUTI, 2007.
    • (2007) Usenix SRUTI
    • Defrawy, K.E.1    Gjoka, M.2    Markopoulou, A.3
  • 24
    • 47249089157 scopus 로고    scopus 로고
    • DDoS Vulnerability Analysis of BitTorrent Protocol,
    • Tech. Rep
    • K. C. Sia, "DDoS Vulnerability Analysis of BitTorrent Protocol," Tech. Rep., 2007.
    • (2007)
    • Sia, K.C.1
  • 25
    • 47249098419 scopus 로고    scopus 로고
    • Prolexic, http://prolexic.com/news/20070514-alert.php.
    • Prolexic
  • 27
    • 47249120456 scopus 로고    scopus 로고
    • DNS amplification attacks
    • "DNS amplification attacks," http://www.isotf.org/news/DNS- Amplification-Attacks.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.