메뉴 건너뛰기




Volumn 17, Issue 1, 2009, Pages 26-39

DDoS-shield: DDoS-resilient scheduling to counter application layer attacks

Author keywords

Anomaly detection; Application layer attacks; Denial of service attacks; Information entropy; Site security monitoring

Indexed keywords

COMPUTER CRIME; INTERNET PROTOCOLS; MONITORING; NETWORK SECURITY; SCHEDULING; SERVERS; TELECOMMUNICATION NETWORKS;

EID: 61449207953     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2008.926503     Document Type: Article
Times cited : (161)

References (35)
  • 1
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-resilient scheduling to counter application layer attacks under imperfect detection
    • presented at the, Barcelona, Spain, Apr
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-resilient scheduling to counter application layer attacks under imperfect detection," presented at the IEEE 1NFOCOM, Barcelona, Spain, Apr. 2006.
    • (2006) IEEE 1NFOCOM
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 5
    • 61449143219 scopus 로고    scopus 로고
    • United States Vs Jay Echouafni et al. (Operation Cyber-slam) U.S. Dept. Justice [Online]. Available: www.usdoj.gov/criminal/fraud/docs/ reports/2004/websnare.pdf
    • United States Vs Jay Echouafni et al. (Operation Cyber-slam) U.S. Dept. Justice [Online]. Available: www.usdoj.gov/criminal/fraud/docs/ reports/2004/websnare.pdf
  • 6
    • 8344285705 scopus 로고    scopus 로고
    • Wide area redirection of dynamic content in Internet data centers
    • presented at the, Hong Kong
    • S. Ranjan, R. Karrer, and E. Knightly, "Wide area redirection of dynamic content in Internet data centers," presented at the IEEE INFOCOM, Hong Kong, 2004.
    • (2004) IEEE INFOCOM
    • Ranjan, S.1    Karrer, R.2    Knightly, E.3
  • 8
    • 61449248808 scopus 로고    scopus 로고
    • Online, Available
    • Akamai. [Online]. Available: http://www.akamai.com
    • Akamai
  • 9
    • 84948416317 scopus 로고    scopus 로고
    • S. Ranjan, J. Rolia, H. Fu, and E. Knightly, QoS-driven server migration for Internet data centers, presented at the IWQoS, Miami Beach, FL, 2002.
    • S. Ranjan, J. Rolia, H. Fu, and E. Knightly, "QoS-driven server migration for Internet data centers," presented at the IWQoS, Miami Beach, FL, 2002.
  • 10
    • 85084163131 scopus 로고    scopus 로고
    • Scalable content-aware request distribution in cluster-based network servers
    • presented at the, San Diego, CA, Jun
    • M. Aron, D. Sanders, P. Druschel, and W. Zwaenepoel, "Scalable content-aware request distribution in cluster-based network servers," presented at the USENIX Annual Technical Conf., San Diego, CA, Jun. 2000.
    • (2000) USENIX Annual Technical Conf
    • Aron, M.1    Sanders, D.2    Druschel, P.3    Zwaenepoel, W.4
  • 11
    • 85094648943 scopus 로고    scopus 로고
    • Conflict-aware scheduling for dynamic content applications
    • presented at the, Internet Technologies and Systems USITS, Seattle, WA, Mar
    • C. Amza, A. Cox, and W. Zwaenepoel, "Conflict-aware scheduling for dynamic content applications," presented at the 4th USENIX Symp. Internet Technologies and Systems (USITS), Seattle, WA, Mar. 2003.
    • (2003) 4th USENIX Symp
    • Amza, C.1    Cox, A.2    Zwaenepoel, W.3
  • 12
    • 0000635802 scopus 로고    scopus 로고
    • Integrating user-perceived quality into web server design
    • presented at the, Amsterdam
    • N. Bhatti, A. Bouch, and A. Kuchinsky, "Integrating user-perceived quality into web server design," presented at the World Wide Web Conf., Amsterdam, 2000.
    • (2000) World Wide Web Conf
    • Bhatti, N.1    Bouch, A.2    Kuchinsky, A.3
  • 14
    • 34250115918 scopus 로고
    • An examination of procedures for determining the number of clusters in a data set
    • G. W. Milligan and M. C. Cooper, "An examination of procedures for determining the number of clusters in a data set," Pyschometrika, vol. 50, pp. 159-179, 1985.
    • (1985) Pyschometrika , vol.50 , pp. 159-179
    • Milligan, G.W.1    Cooper, M.C.2
  • 16
    • 0032183789 scopus 로고    scopus 로고
    • The method of types
    • I. Csiszar, "The method of types," IEEE Trans. Inf. Theory, vol. 44, pp. 2505-2523, 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , pp. 2505-2523
    • Csiszar, I.1
  • 17
    • 84924375780 scopus 로고    scopus 로고
    • S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds, presented at the NSDI, Boston, MA, 2005.
    • S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, "Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds," presented at the NSDI, Boston, MA, 2005.
  • 18
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistics-based overload control against distributed denial-of-service attacks
    • presented at the, Hong Kong
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "PacketScore: Statistics-based overload control against distributed denial-of-service attacks," presented at the IEEE INFOCOM, Hong Kong, 2004.
    • (2004) IEEE INFOCOM
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 19
    • 33645778005 scopus 로고    scopus 로고
    • Online, Available
    • Mazu Profiler. [Online]. Available: http://www.mazunetworks.com
    • Mazu Profiler
  • 20
  • 21
    • 61449157031 scopus 로고    scopus 로고
    • L. Ricciulli, P. Lincoln, and P. Kakkar, TCP SYN flooding defense, presented at the CNDS, San Francisco, CA, 1999.
    • L. Ricciulli, P. Lincoln, and P. Kakkar, "TCP SYN flooding defense," presented at the CNDS, San Francisco, CA, 1999.
  • 22
    • 39049161433 scopus 로고    scopus 로고
    • Identification of repeated denial of service attacks
    • presented at the, Barcelona, Spain
    • A. Hussain, J. Heidemann, and C. Papadopoulos, "Identification of repeated denial of service attacks," presented at the IEEE INFOCOM, Barcelona, Spain, 2006.
    • (2006) IEEE INFOCOM
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 23
    • 33645792808 scopus 로고    scopus 로고
    • Profiling Internet backbone traffic: Behavior models and applications
    • K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet backbone traffic: Behavior models and applications," Proc. ACM SIGCOMM, 2005.
    • (2005) Proc. ACM SIGCOMM
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 24
    • 61449193918 scopus 로고    scopus 로고
    • A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, presented at the ACMSIGCOMM, Philadelphia, PA, 2005.
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," presented at the ACMSIGCOMM, Philadelphia, PA, 2005.
  • 26
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Dec
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, pp. 2435-2463, Dec. 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 27
    • 77953077374 scopus 로고    scopus 로고
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites, presented at theWorldWideWeb Conf., Honolulu, HI, May 2002.
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites," presented at theWorldWideWeb Conf., Honolulu, HI, May 2002.
  • 28
  • 30
    • 0041431049 scopus 로고    scopus 로고
    • Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA
    • G. Mori and J. Malik, "Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA," IEEE Comput. Vision Pattern Recognit. vol. 1, pp. 134-141, 2003.
    • (2003) IEEE Comput. Vision Pattern Recognit , vol.1 , pp. 134-141
    • Mori, G.1    Malik, J.2
  • 31
    • 61449203507 scopus 로고    scopus 로고
    • A. Garg and A. L. N. Reddy, Mitigating denial of service attacks using QoS regulation, presented at the IWQoS, Miami Beach, FL, May 2002.
    • A. Garg and A. L. N. Reddy, "Mitigating denial of service attacks using QoS regulation," presented at the IWQoS, Miami Beach, FL, May 2002.
  • 32
    • 85034043506 scopus 로고    scopus 로고
    • Protecting web servers from distributed denial of service attacks
    • presented at the, Hong Kong
    • F. Kargl, J. Maier, and M. Weber, "Protecting web servers from distributed denial of service attacks," presented at the World Wide Web Conf., Hong Kong, 2001.
    • (2001) World Wide Web Conf
    • Kargl, F.1    Maier, J.2    Weber, M.3
  • 33
    • 85050149881 scopus 로고    scopus 로고
    • Active Internet traffic filtering: Real-time response to denial-of-service attacks
    • presented at the, Anaheim, CA, Apr
    • K. Argyraki and D. Cheriton, "Active Internet traffic filtering: Real-time response to denial-of-service attacks," presented at the USENIX Annual Techical Conf., Anaheim, CA, Apr. 2005.
    • (2005) USENIX Annual Techical Conf
    • Argyraki, K.1    Cheriton, D.2
  • 34
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial-of-service with capabilities
    • presented at the, HotNets-II, Cambridge, MA, Nov
    • T. Anderson, T. Roscoe, and D. Wetherall, "Preventing Internet denial-of-service with capabilities," presented at the 2nd Workshop on Hot Topics in Networks (HotNets-II), Cambridge, MA, Nov. 2003.
    • (2003) 2nd Workshop on Hot Topics in Networks
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.