메뉴 건너뛰기




Volumn , Issue , 2006, Pages

On filtering of DDoS attacks based on source address prefixes

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK PACKETS; COLLATERAL DAMAGE; DDOS ATTACKS; DISTRIBUTED DENIAL-OF-SERVICE ATTACKS; FLOODING ATTACKS; HARD PROBLEMS; INTERNET SERVICES; SOURCE ADDRESS;

EID: 50049083120     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOMW.2006.359537     Document Type: Conference Paper
Times cited : (19)

References (33)
  • 1
    • 50049134631 scopus 로고    scopus 로고
    • Ddos mitigation via regional cleaning centers. Technical report, RR04-ATL-013177, August
    • Sharad Agarwal, Travis Dawson, and Christos Tryfonas. Ddos mitigation via regional cleaning centers. Technical report, Sprint ATL Research Report RR04-ATL-013177, August 2003.
    • (2003) Sprint ATL Research Report
    • Agarwal, S.1    Dawson, T.2    Tryfonas, C.3
  • 2
    • 85050149881 scopus 로고    scopus 로고
    • Active internet traffic filtering: Real-time response to denial-of-service attacks
    • April
    • Katerina Argyraki and David R. Cheriton. Active internet traffic filtering: Real-time response to denial-of-service attacks. In USENIX Technical Conference, April 2005.
    • (2005) USENIX Technical Conference
    • Argyraki, K.1    Cheriton, D.R.2
  • 4
    • 50049093989 scopus 로고    scopus 로고
    • Scott Berinato. How a bookmaker and a whiz kid took on an extortionist and won. http://www.csoonline.com/read/050105/ extortion.html, May 2005.
    • Scott Berinato. How a bookmaker and a whiz kid took on an extortionist and won. http://www.csoonline.com/read/050105/ extortion.html, May 2005.
  • 5
    • 79961236654 scopus 로고    scopus 로고
    • The spoofer project: Inferring the extent of internet source address filtering on the internet
    • Robert Beverly and Steve Bauer. The spoofer project: Inferring the extent of internet source address filtering on the internet. In USENIX SRUTI, My 2005.
    • (2005) USENIX SRUTI, My
    • Beverly, R.1    Bauer, S.2
  • 6
    • 50049106164 scopus 로고    scopus 로고
    • February 2005
    • Cassell Bryan-Low. Hacker hitmen. http://www.wsjclassroomedition.com/ archive/ 05feb/onln_hacker.htm, February 2005.
    • Cassell Bryan-Low. Hacker hitmen
  • 7
  • 8
    • 50049093521 scopus 로고    scopus 로고
    • the network and the data plane
    • Cisco. Preparation for the attack: securing the network and the data plane. ftp://ftp-eng.cisco.com/cons/isp/security/ ISP-Security-Bootcamp- Singapore-2003/ C-Preparation-DataPlane-ACLs-v3-0.pdf.
    • Preparation for the attack: Securing
  • 10
    • 85084163167 scopus 로고    scopus 로고
    • Multops: A data-structure for bandwidth attack detection
    • July
    • Thomer M. Gil and Massimiliano Poletto. Multops: a data-structure for bandwidth attack detection. In USENIX Security Symposium, July 2001.
    • (2001) USENIX Security Symposium
    • Gil, T.M.1    Poletto, M.2
  • 11
    • 50049090596 scopus 로고    scopus 로고
    • Patrick Gray. DDoS attack cripples Uecomm's AU links. http://www.zdnet.com.au/news/security/ 0, 2000061744, 20273027, 00.htm, March 2003.
    • Patrick Gray. DDoS attack cripples Uecomm's AU links. http://www.zdnet.com.au/news/security/ 0, 2000061744, 20273027, 00.htm, March 2003.
  • 12
    • 50049088222 scopus 로고    scopus 로고
    • Ann Harrison. Cyberassaults hit Buy.com, eBay, CNN and Amazon. http://www.computerworld.com/news/ 2000/story/0, 11280, 43010, 00.html, February 2000.
    • Ann Harrison. Cyberassaults hit Buy.com, eBay, CNN and Amazon. http://www.computerworld.com/news/ 2000/story/0, 11280, 43010, 00.html, February 2000.
  • 14
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
    • May
    • Jayeon Jung, Balachander Krishnamurthy, and Michael Rabinovich. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites. In Proceedings of WWW, May 2002.
    • (2002) Proceedings of WWW
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 15
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
    • May
    • Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger. Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds. In NSDI, May 2005.
    • (2005) NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 21
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • David Moore, Colleen Shannon, and Jeffery Brown. Code-red: a case study on the spread and victims of an internet worm. In Internet Measurement Workshop, 2002.
    • (2002) Internet Measurement Workshop
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 25
    • 84929450585 scopus 로고    scopus 로고
    • On filtering of DDoS attacks based on source address prefixes
    • Technical Report 1547, University of Wisconsin-Madison, Department of Computer Sciences, December
    • Gary Pack, Jaeyoung Yoon, Eli Collins, and Cristian Estan. On filtering of DDoS attacks based on source address prefixes. Technical Report 1547, University of Wisconsin-Madison, Department of Computer Sciences, December 2005.
    • (2005)
    • Pack, G.1    Yoon, J.2    Collins, E.3    Estan, C.4
  • 27
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • August
    • Kihong Park and Heejo Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In Proceedings of the ACM SIGCOMM, August 2001.
    • (2001) Proceedings of the ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 28
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attack using history-based ip filtering
    • May
    • Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao. Protection from distributed denial of service attack using history-based ip filtering. In IEEE International Conference on Communications, pages 482-486, May 2003.
    • (2003) IEEE International Conference on Communications , pp. 482-486
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 29
    • 50049126658 scopus 로고    scopus 로고
    • Prolexic.http://www.prolexic.com/.
    • Prolexic
  • 31
    • 50049088134 scopus 로고    scopus 로고
    • Paul Vixie, Gerry Sneeringer, and Mark Schleifer. Events of 21-oct-2002. http://d.root-servers.org/ October21.txt, November 2002.
    • Paul Vixie, Gerry Sneeringer, and Mark Schleifer. Events of 21-oct-2002. http://d.root-servers.org/ October21.txt, November 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.