메뉴 건너뛰기




Volumn , Issue , 2008, Pages 682-690

Live baiting for service-level DoS attackers

Author keywords

Attacker detection; Denial of service; Group testing

Indexed keywords

ATTACKER DETECTION; COMPUTER COMMUNICATIONS; DENIAL-OF-SERVICE; GROUP TESTING; INFOCOM;

EID: 51349125816     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.43     Document Type: Conference Paper
Times cited : (29)

References (41)
  • 1
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • Virgil D. Gligor, "A note on denial-of-service in operating systems.," IEEE Trans. Software Eng., vol. 10, no. 3, pp. 320-324, 1984.
    • (1984) IEEE Trans. Software Eng , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 4
    • 14844282689 scopus 로고    scopus 로고
    • Guaranteeing access in spite of distributed serviceflooding attacks
    • Virgil D. Gligor, "Guaranteeing access in spite of distributed serviceflooding attacks.," in Security Protocols Workshop, 2003, pp. 80-96.
    • (2003) Security Protocols Workshop , pp. 80-96
    • Gligor, V.D.1
  • 5
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
    • Cristian Estan and George Varghese. "New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice," ACM Trans. Comput. Syst., vol. 21, no. 3, pp. 270-313. 2003.
    • (2003) ACM Trans. Comput. Syst , vol.21 , Issue.3 , pp. 270-313
    • Estan, C.1    Varghese, G.2
  • 6
    • 84860726329 scopus 로고    scopus 로고
    • Rangarajan Vasudevan. Z. Morley Mao, Oliver Spatscheck, and Jacobus van der Merwe, Reval: A tool for real-time evaluation of ddos mitigation strategies. in Proceedings of the 2006 USENIX Annual Technical Conferrence. 2006.
    • Rangarajan Vasudevan. Z. Morley Mao, Oliver Spatscheck, and Jacobus van der Merwe, "Reval: A tool for real-time evaluation of ddos mitigation strategies." in Proceedings of the 2006 USENIX Annual Technical Conferrence. 2006.
  • 7
    • 33645779745 scopus 로고    scopus 로고
    • Dcap: Detecting misbehaving flows via collaborative aggregate policing
    • Chen-Nee Chuah, Lakshminarayanan Subramanian, and Randy H. Katz, "Dcap: detecting misbehaving flows via collaborative aggregate policing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 5, pp. 5-18, 2003.
    • (2003) SIGCOMM Comput. Commun. Rev , vol.33 , Issue.5 , pp. 5-18
    • Chuah, C.-N.1    Subramanian, L.2    Katz, R.H.3
  • 8
    • 0004132127 scopus 로고
    • On the detection of defective members of large populations
    • Dec
    • Andrew Sterrett, "On the detection of defective members of large populations," The Annals of Mathematical Statistics, vol. 28. no. 4, pp. 1033-1036, Dec. 1957.
    • (1957) The Annals of Mathematical Statistics , vol.28 , Issue.4 , pp. 1033-1036
    • Sterrett, A.1
  • 9
    • 0001243071 scopus 로고
    • The detection of defective members of large pop-ulations
    • Dec
    • Robert Dorfman, "The detection of defective members of large pop-ulations," The Annals of Mathematical Statistics, vol. 14, no. 4, pp. 436-440, Dec. 1943.
    • (1943) The Annals of Mathematical Statistics , vol.14 , Issue.4 , pp. 436-440
    • Dorfman, R.1
  • 10
    • 0012109964 scopus 로고    scopus 로고
    • The Honeynet Project, Addison-Wisley, Indianapolis, IN
    • The Honeynet Project. Know Your Enemy, Addison-Wisley, Indianapolis, IN, 2002.
    • (2002) Know Your Enemy
  • 11
    • 84903755100 scopus 로고    scopus 로고
    • Honeypots for distributed denial-of-service attacks
    • N. Weiler, "Honeypots for distributed denial-of-service attacks." in Proceedings of WET ICE 2002.
    • Proceedings of WET ICE 2002
    • Weiler, N.1
  • 15
    • 33746954566 scopus 로고    scopus 로고
    • Honeypot back-propagation for mitigating spoofing distributed denial-ofservice attacks
    • Special Issue on Security in Grid and Distributed Systems, Sept
    • Sherif Khattab. Rami Melhem. Daniel Mossé, and Taieb Znati, "Honeypot back-propagation for mitigating spoofing distributed denial-ofservice attacks," Journal of Parallel and Distributed Computing (JPDC) Special Issue on Security in Grid and Distributed Systems, vol. 66, no. 9, pp. 1152-1164. Sept 2006.
    • (2006) Journal of Parallel and Distributed Computing (JPDC) , vol.66 , Issue.9 , pp. 1152-1164
    • Khattab, S.1    Melhem, R.2    Mossé, D.3    Znati, T.4
  • 16
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • Luis von Ahn, Manuel Blum, and John Langford, "Telling humans and computers apart automatically," Commun. ACM, vol. 47, no. 2, pp. 56-60, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.2 , pp. 56-60
    • Luis von Ahn, M.B.1    Langford, J.2
  • 19
    • 0042008122 scopus 로고    scopus 로고
    • Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels
    • Annalisa De Bonis and Ugo Vaccaro, "Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels," Theor. Comput. Sci., vol. 306. no. 1-3, pp. 223-243, 2003.
    • (2003) Theor. Comput. Sci , vol.306 , Issue.1-3 , pp. 223-243
    • Bonis, A.D.1    Vaccaro, U.2
  • 23
    • 85000701895 scopus 로고    scopus 로고
    • My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
    • April
    • Moheeb Abu Rajab, Jay Zarfoss. Fabian Monrose, and Andreas Terzis, "My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging," in Proceedings of USENIX/HotBots, April 2007.
    • (2007) Proceedings of USENIX/HotBots
    • Abu Rajab, M.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 24
    • 77953077374 scopus 로고    scopus 로고
    • Jaeyeon Jung, Balachander Krishnamurthy. and Michael Rabinovich, Flash crowds and denial of service attacks: characterization and implications for cdns and web sites, in WWW '02: Proceedings of the 11th international conference on World Wide Web. New York. NY, IJSA, 2002, pp. 293-304, ACM Press.
    • Jaeyeon Jung, Balachander Krishnamurthy. and Michael Rabinovich, "Flash crowds and denial of service attacks: characterization and implications for cdns and web sites," in WWW '02: Proceedings of the 11th international conference on World Wide Web. New York. NY, IJSA, 2002, pp. 293-304, ACM Press.
  • 26
    • 51349112249 scopus 로고    scopus 로고
    • Live Baiting for Service-level DoS Attackers, April 2006
    • "Live Baiting for Service-level DoS Attackers." http://www.cs.pitt.edu/~skhattab/livebait.pdf. April 2006.
  • 27
    • 0003629990 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 180-2, August
    • Federal Information Processing Standards Publication 180-2. "Secure hash standard." August 2002.
    • (2002) Secure hash standard
  • 30
    • 1642283261 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,
    • Tech. Rep. 020018, Computer Science Department, University of California. Los Angeles
    • Jelena Mirkovic, Janice Martin, and Peter Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Tech. Rep. 020018, Computer Science Department, University of California. Los Angeles, 2002.
    • (2002)
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 32
    • 79955747674 scopus 로고    scopus 로고
    • Vyas Sekar, Nick Duffield, Oliver Spatscheck, Jacobus van der Merwe, and Hui Zhang, Lads: Large-scale automated ddos detection system, in Proceedings of the 2006 USENIX Annual Technical Conference, 2006.
    • Vyas Sekar, Nick Duffield, Oliver Spatscheck, Jacobus van der Merwe, and Hui Zhang, "Lads: Large-scale automated ddos detection system," in Proceedings of the 2006 USENIX Annual Technical Conference, 2006.
  • 33
    • 33845591142 scopus 로고    scopus 로고
    • Ddosresilient scheduling to counter application layer attacks under imperfect detection
    • Barcelona, Spain. April, IEEE
    • S. Ranjan, R. Swaminathan. M. Uysal, and E. Knightly. "Ddosresilient scheduling to counter application layer attacks under imperfect detection." in Proceedings of the IEEE Infocom, Barcelona, Spain. April 2006, IEEE.
    • (2006) Proceedings of the IEEE Infocom
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.