메뉴 건너뛰기




Volumn 31, Issue 4, 2008, Pages 509-534

A collaborative defense mechanism against SYN flooding attacks in IP networks

Author keywords

Denial of Service; IP spoofing; Network security; SYN flooding

Indexed keywords

COMMUNICATION; LAW ENFORCEMENT; LAWS AND LEGISLATION; MECHANISMS; NETWORK PROTOCOLS; ROUTERS; SATELLITE LINKS; TRANSMISSION CONTROL PROTOCOL;

EID: 47949098054     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2007.12.004     Document Type: Article
Times cited : (20)

References (31)
  • 1
    • 47949103606 scopus 로고    scopus 로고
    • CERT: advisory CA-1998-01. Smurf IP Denial of Service Attacks, available at 〈http://www.cert.org/advisories/CA-1998-01.html〉; January 1998.
    • CERT: advisory CA-1998-01. Smurf IP Denial of Service Attacks, available at 〈http://www.cert.org/advisories/CA-1998-01.html〉; January 1998.
  • 2
    • 0033723631 scopus 로고    scopus 로고
    • Chen Y-W. Study on the prevention of SYN flooding by using traffic policing. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2000), 2000, p. 593-604.
    • Chen Y-W. Study on the prevention of SYN flooding by using traffic policing. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2000), 2000, p. 593-604.
  • 3
    • 47949095721 scopus 로고    scopus 로고
    • Cisco Systems, Inc. Cisco security advisory: 7xx router password buffer overflow, 〈http://www.cisco.com/warp/public/770/pwbuf-pub.shtml〉; June 1998.
    • Cisco Systems, Inc. Cisco security advisory: 7xx router password buffer overflow, 〈http://www.cisco.com/warp/public/770/pwbuf-pub.shtml〉; June 1998.
  • 4
    • 47949113539 scopus 로고    scopus 로고
    • Cisco Systems, Inc. Defining strategies to protect against TCP SYN denial of service attacks, 〈http://www.cisco.com/warp/public/707/4.html〉; July 1999.
    • Cisco Systems, Inc. Defining strategies to protect against TCP SYN denial of service attacks, 〈http://www.cisco.com/warp/public/707/4.html〉; July 1999.
  • 5
    • 85010849899 scopus 로고    scopus 로고
    • Crosby S, Wallach D. Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX security symposium, August 2003, p. 29-44.
    • Crosby S, Wallach D. Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX security symposium, August 2003, p. 29-44.
  • 6
    • 47949084640 scopus 로고    scopus 로고
    • Cyber-crime-the targets it hits, the damage it does, available at 〈http://www.coe.int/T/E/Com/Files/Themes/Cybercrime/e_cybercrime.asp〉.
    • Cyber-crime-the targets it hits, the damage it does, available at 〈http://www.coe.int/T/E/Com/Files/Themes/Cybercrime/e_cybercrime.asp〉.
  • 7
    • 47949115110 scopus 로고    scopus 로고
    • Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC2827 May 2000.
    • Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC2827 May 2000.
  • 9
    • 4143100281 scopus 로고    scopus 로고
    • Hu Y-H, Choi H, Choi H-A. Packet filtering to defend flooding-based DDoS attacks. In: Proceedings of 2004 IEEE/Sarnoff symposium on advances in wired and wireless communication, April 2004, p. 39-42.
    • Hu Y-H, Choi H, Choi H-A. Packet filtering to defend flooding-based DDoS attacks. In: Proceedings of 2004 IEEE/Sarnoff symposium on advances in wired and wireless communication, April 2004, p. 39-42.
  • 10
    • 17644411571 scopus 로고    scopus 로고
    • Jin C, Wang H, Shin K-G. Hop-count filtering: an effective defense against spoofed DoS traffic. In: Proceedings of the 10th ACM international conference on Computer and Communications Security (CCS), October 2003, p. 30-41.
    • Jin C, Wang H, Shin K-G. Hop-count filtering: an effective defense against spoofed DoS traffic. In: Proceedings of the 10th ACM international conference on Computer and Communications Security (CCS), October 2003, p. 30-41.
  • 11
    • 85034043506 scopus 로고    scopus 로고
    • Kargl F, Maier J, Weber M. Protecting web servers from distributed denial of service attacks. In: Proceedings of the 10th international conference on World Wide Web, Hong Kong, China, May 2001, p. 514-524.
    • Kargl F, Maier J, Weber M. Protecting web servers from distributed denial of service attacks. In: Proceedings of the 10th international conference on World Wide Web, Hong Kong, China, May 2001, p. 514-524.
  • 12
    • 47949084139 scopus 로고    scopus 로고
    • Karig D, Lee RB. Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University, October 2001 (Technical report CE-L2001-002).
    • Karig D, Lee RB. Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University, October 2001 (Technical report CE-L2001-002).
  • 14
    • 47949098146 scopus 로고    scopus 로고
    • Lemon J. Resisting SYN flooding DoS attacks with a SYN cache. In: Proceedings of USENIX BSDCon '02 conference on file and storage technologies, February 2002.
    • Lemon J. Resisting SYN flooding DoS attacks with a SYN cache. In: Proceedings of USENIX BSDCon '02 conference on file and storage technologies, February 2002.
  • 15
    • 47949130553 scopus 로고    scopus 로고
    • Levine JR. LEX and YACC, O'Reilly Media, October 1992.
    • Levine JR. LEX and YACC, O'Reilly Media, October 1992.
  • 16
    • 47949087799 scopus 로고    scopus 로고
    • libpcap. Packet capture library, 〈http://sourceforge.net/projects/libpcap/〉.
    • libpcap. Packet capture library, 〈http://sourceforge.net/projects/libpcap/〉.
  • 18
    • 47949130014 scopus 로고    scopus 로고
    • NISCC Technical Note 01/2006. Egress and ingress filtering, available at 〈http://www.cpni.gov.uk/Docs/re-20060420-00294.pdf〉; April 2006.
    • NISCC Technical Note 01/2006. Egress and ingress filtering, available at 〈http://www.cpni.gov.uk/Docs/re-20060420-00294.pdf〉; April 2006.
  • 19
    • 0034430750 scopus 로고    scopus 로고
    • Noureldien N-A, Osman I-M. A stateful inspection module architecture. In: Proceedings TENCON 2000, p. 259-265.
    • Noureldien N-A, Osman I-M. A stateful inspection module architecture. In: Proceedings TENCON 2000, p. 259-265.
  • 20
    • 47949104866 scopus 로고    scopus 로고
    • NS-2 simulator, 〈http://www.isi.edu/nsnam/ns〉; 2006.
    • NS-2 simulator, 〈http://www.isi.edu/nsnam/ns〉; 2006.
  • 21
    • 33748357341 scopus 로고    scopus 로고
    • Ohsita Y, Ata S, Murata M. Deployable overlay network for defense against distributed SYN flood attacks. In: Proceedings of the 14th international conference on computer communications and networks, October 2005, p. 407-12.
    • Ohsita Y, Ata S, Murata M. Deployable overlay network for defense against distributed SYN flood attacks. In: Proceedings of the 14th international conference on computer communications and networks, October 2005, p. 407-12.
  • 22
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Paxson V. An analysis of using reflectors for distributed denial-of-service attacks. ACM Comput Commun Rev (CCR) 31 3 (2001) 38-47
    • (2001) ACM Comput Commun Rev (CCR) , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 23
    • 47949084407 scopus 로고    scopus 로고
    • Postel J. Internet control message protocol. RFC 792 September 1981.
    • Postel J. Internet control message protocol. RFC 792 September 1981.
  • 24
    • 0030715989 scopus 로고    scopus 로고
    • Schuba C-H, Krsul I-V, Khan M-G, Spafford E-H, Sundaram A, Zamboni D. Analysis of a denial of service attack on TCP. In: Proceedings of the IEEE symposium on security and privacy, May 1997, pp. 208-23.
    • Schuba C-H, Krsul I-V, Khan M-G, Spafford E-H, Sundaram A, Zamboni D. Analysis of a denial of service attack on TCP. In: Proceedings of the IEEE symposium on security and privacy, May 1997, pp. 208-23.
  • 25
    • 0003428414 scopus 로고
    • Addison-Wesley, Reading, MA
    • Stevens R. TCP/IP illustrated vol. 1 (1994), Addison-Wesley, Reading, MA
    • (1994) TCP/IP illustrated , vol.1
    • Stevens, R.1
  • 26
    • 47949111376 scopus 로고    scopus 로고
    • SUN's TCP SYN Flooding Solutions available at 〈http://www.ciac.org/ciac/bulletins/h-02.shtml〉.
    • SUN's TCP SYN Flooding Solutions available at 〈http://www.ciac.org/ciac/bulletins/h-02.shtml〉.
  • 27
    • 18144370750 scopus 로고    scopus 로고
    • Tupakula U-K, Varadharajan V, Gajam A-K. Counteracting TCP SYN DDoS attacks using automated model. In: Proceedings of IEEE the Global Telecommunications Conference (GLOBECOM '04) December 2004, p. 2240-4.
    • Tupakula U-K, Varadharajan V, Gajam A-K. Counteracting TCP SYN DDoS attacks using automated model. In: Proceedings of IEEE the Global Telecommunications Conference (GLOBECOM '04) December 2004, p. 2240-4.
  • 28
    • 47949126388 scopus 로고    scopus 로고
    • Venema W. TCP WRAPPER: network monitoring, access control, and booby traps at 〈http://www.vtcif.telstra.com.au/pub/docs/security/tcp_wrapper.txt〉.
    • Venema W. TCP WRAPPER: network monitoring, access control, and booby traps at 〈http://www.vtcif.telstra.com.au/pub/docs/security/tcp_wrapper.txt〉.
  • 29
    • 0036375286 scopus 로고    scopus 로고
    • Wang H, Zhang D, Shin G. SYN-dog: sniffing SYN flooding sources. In: Proceedings of the 22nd International Conference On Distributed Computing Systems (Icdcs'02), July 2002a, p. 421-8.
    • Wang H, Zhang D, Shin G. SYN-dog: sniffing SYN flooding sources. In: Proceedings of the 22nd International Conference On Distributed Computing Systems (Icdcs'02), July 2002a, p. 421-8.
  • 30
    • 0036343692 scopus 로고    scopus 로고
    • Wang H, Zhang D, Shin K. Detecting SYN flooding attacks. In: Proceedings of the twenty-first annual joint conference of the IEEE computer and communications societies, June 2002b, p. 1530-9.
    • Wang H, Zhang D, Shin K. Detecting SYN flooding attacks. In: Proceedings of the twenty-first annual joint conference of the IEEE computer and communications societies, June 2002b, p. 1530-9.
  • 31
    • 47949109139 scopus 로고    scopus 로고
    • Zuquete A. Improving the functionality of SYN cookies. In: Proceedings of 6th IFIP communications and multimedia security conference, September 2002, p. 57-77.
    • Zuquete A. Improving the functionality of SYN cookies. In: Proceedings of 6th IFIP communications and multimedia security conference, September 2002, p. 57-77.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.