메뉴 건너뛰기




Volumn , Issue , 2008, Pages 266-270

Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; COMPUTER NETWORKS; DATA STRUCTURES; FILE ORGANIZATION; MECHANISMS;

EID: 51449088190     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.298     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • S. A. Crosby and D. S. Wallach, "Denial of service via algorithmic complexity attacks,' in Usenix Security, 2003.
    • (2003) Usenix Security
    • Crosby, S.A.1    Wallach, D.S.2
  • 2
    • 79952452968 scopus 로고    scopus 로고
    • Aggressiveness protective fair queueing for bursty applications (short paper)
    • A. Bremler-Barr, H. Levy, and N. Halachmi, "Aggressiveness protective fair queueing for bursty applications (short paper)," in IWQoS, 2006.
    • (2006) IWQoS
    • Bremler-Barr, A.1    Levy, H.2    Halachmi, N.3
  • 3
    • 17744369470 scopus 로고    scopus 로고
    • Exploiting the transients of adaptation for RoQ attacks on internet resources
    • M. Guirguis, A. Bestavros, and I. Matta, "Exploiting the transients of adaptation for RoQ attacks on internet resources," in ICNP, 2004.
    • (2004) ICNP
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3
  • 4
    • 25844458510 scopus 로고    scopus 로고
    • Reduction of quality (roq) attacks on internet end-systems
    • M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (roq) attacks on internet end-systems," in INFOCOM, 2005.
    • (2005) INFOCOM
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 5
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)
    • A. Kuzmanovic and E. W. Knightly, "Low-rate tcp-targeted denial of service attacks (the shrew vs. the mice and elephants)," in ACM SIGCOMM, 2003.
    • (2003) ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 6
    • 51449086315 scopus 로고    scopus 로고
    • Reduction of quality (roq) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs
    • I. M. M. Guirguism, A. Bestavros and Z. Y, "Reduction of quality (roq) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs," in Inforom, 2007.
    • (2007) Inforom
    • Guirguism, I.M.M.1    Bestavros, A.2
  • 8
    • 0017467242 scopus 로고    scopus 로고
    • Individual versus social optimization in exponential congestion systems
    • S. Lippman and S. Stidham, "Individual versus social optimization in exponential congestion systems," Operations Research, vol. 25, pp. 233-247, 1997.
    • (1997) Operations Research , vol.25 , pp. 233-247
    • Lippman, S.1    Stidham, S.2
  • 11
    • 51449119524 scopus 로고    scopus 로고
    • T. Peters, 2003. http://mail.python.org/pipermail/python-dev/2003-May/ 035916.html.
    • (2003)
    • Peters, T.1
  • 12
    • 1542350966 scopus 로고    scopus 로고
    • Fast content-based packet handling for intrusion detectin
    • CS2001-0670
    • M. Fisk and G. Varghese, "Fast content-based packet handling for intrusion detectin." UCSD TR CS2001-0670.
    • UCSD TR
    • Fisk, M.1    Varghese, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.