메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 26-36

Analyzing interaction between distributed denial of service attacks and mitigation technologies

Author keywords

Analytical models; Computer crime; Computer networks; Fault tolerance; Laboratories; Performance analysis; Physics; Protocols; Space technology; Testing

Indexed keywords

ANALYTICAL MODELS; COMPUTER CRIME; COMPUTER NETWORKS; FAULT TOLERANCE; LABORATORIES; NETWORK PROTOCOLS; NETWORK SECURITY; PHYSICS; TESTING; TRANSMISSION CONTROL PROTOCOL;

EID: 58049101580     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194870     Document Type: Conference Paper
Times cited : (48)

References (6)
  • 1
    • 84942290660 scopus 로고    scopus 로고
    • provides information on the DARPA Fault Tolerant Networks Program
    • http://www.iaands.org/FTN-Main.htm provides information on the DARPA Fault Tolerant Networks Program
  • 2
    • 84942290661 scopus 로고    scopus 로고
    • Distributed Denial of Service Defense Attack Tradeoff Analysis Verification and Validation Report
    • September VS-02-104
    • JHU/APL Report "Distributed Denial of Service Defense Attack Tradeoff Analysis Verification and Validation Report," September 2002, VS-02-104.
    • (2002) JHU/APL Report
  • 3
    • 0041482634 scopus 로고    scopus 로고
    • CERT Coordination Center, Pittsburgh, PA
    • "CERT/CC Overview Incident and Vulnerability Trends," CERT Coordination Center, Pittsburgh, PA. 2002. http://www.cert.org/present/certoverview-trends/
    • (2002) CERT/CC Overview Incident and Vulnerability Trends
  • 4
    • 0030715989 scopus 로고    scopus 로고
    • Analysis of Denial of Service Attack on TCP
    • Los Alamitos, CA, USA: IEEE Computer Society. Press
    • Schuba, C.L., et. al, "Analysis of Denial of Service Attack on TCP," Proceedings. 1997 IEEE Symposium on Security and Privacy; Los Alamitos, CA, USA: IEEE Computer Society. Press, 1997, p. 208-223
    • (1997) Proceedings. 1997 IEEE Symposium on Security and Privacy , pp. 208-223
    • Schuba, C.L.1
  • 6
    • 0036575201 scopus 로고    scopus 로고
    • Characterizing stateful resource attacks using modeling and simulation
    • Wiley May-June
    • Gregg, D. M. , et. al., "Characterizing stateful resource attacks using modeling and simulation," Quality and Reliability Engineering International (Wiley)18, no. 3, (May-June 2002) : p. 251-60.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.3 , pp. 251-260
    • Gregg, D.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.