메뉴 건너뛰기




Volumn , Issue , 2009, Pages 497-501

Honeypot scheme for distributed denial-of-service attack

Author keywords

Denial of service; Honeypot; Network security; Spoofing

Indexed keywords

DEFENSE MECHANISMS; DENIAL-OF-SERVICE; DENIAL-OF-SERVICE ATTACKS; DISTRIBUTED DENIAL-OF-SERVICE ATTACKS; EXISTING PROBLEMS; HONEY POTS; HONEYPOT; LEGITIMATE USERS; OR-NETWORKS; REMOTE CLIENTS; SPOOFING; VIRTUAL COMMUNICATIONS; VIRTUAL MACHINES;

EID: 64949085638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICACC.2009.146     Document Type: Conference Paper
Times cited : (12)

References (22)
  • 1
    • 33847143715 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA, "Nameserver DoS Attack," http://www.caida.org/ projects/dns-analysis/ oct02dos.xml, 2002.
    • (2002) Nameserver DoS Attack
  • 2
    • 64949203941 scopus 로고    scopus 로고
    • CCCA CA-2003-04, MS-SQL Server Worm, http:// www.cert.org/advisories/CA-2003-04.html, 2003.
    • CCCA CA-2003-04, "MS-SQL Server Worm", http:// www.cert.org/advisories/CA-2003-04.html, 2003.
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    • April
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Review, Vol. 34, No. 2 pp. 39-53, April 2004.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 6
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • K. Park and H. Lee, "On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack," In IEEE INFOCOM, pp. 338-347, 2001.
    • (2001) IEEE INFOCOM , pp. 338-347
    • Park, K.1    Lee, H.2
  • 8
    • 3543059601 scopus 로고    scopus 로고
    • StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks,
    • Technical Report CMU-CS-02-208, December
    • A. Perrig, D. Song, and A. Yaar, "StackPi: A New Defense Mechanism against IP Spoofing and DDoS Attacks," Technical Report CMU-CS-02-208, December 2002.
    • (2002)
    • Perrig, A.1    Song, D.2    Yaar, A.3
  • 9
    • 0003334329 scopus 로고    scopus 로고
    • Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
    • May
    • P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," In RFC 2827, May 2001.
    • (2001) RFC 2827
    • Ferguson, P.1    Senie, D.2
  • 11
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and Authenticated Marking Schemes for IP Traceback
    • D. X. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," In IEEE INFOCOM, 2001.
    • (2001) IEEE INFOCOM
    • Song, D.X.1    Perrig, A.2
  • 13
    • 64949124700 scopus 로고    scopus 로고
    • T. H. Project, Know Your Enemy, Addison-Wisley, Indianapolis, IN, 2002.
    • T. H. Project, "Know Your Enemy," Addison-Wisley, Indianapolis, IN, 2002.
  • 15
    • 14844334596 scopus 로고    scopus 로고
    • Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles
    • X. Wang and M. Reiter, "Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles," In ACM CCS 2004.
    • ACM CCS 2004
    • Wang, X.1    Reiter, M.2
  • 16
    • 0038404196 scopus 로고    scopus 로고
    • Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles
    • D. K. Y. Yau, J. C. S. Lui, and F. Liang, "Defending Against Distributed Denial-of-service Attacks with Max-min Fair Server-centric Router Throttles," In IWQoS, 2002.
    • (2002) IWQoS
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3
  • 18
    • 0001987976 scopus 로고    scopus 로고
    • IP Mobility Support
    • October
    • C. Perkins, "IP Mobility Support," In RFC 2002, October 1996.
    • (1996) RFC 2002
    • Perkins, C.1
  • 20
    • 0034775309 scopus 로고    scopus 로고
    • Hash-based IP traceback
    • A. C. Snoeren, "Hash-based IP traceback," In ACM SIGCOMM, pp. 3-14, 2001.
    • (2001) ACM SIGCOMM , pp. 3-14
    • Snoeren, A.C.1
  • 22
    • 64949170331 scopus 로고    scopus 로고
    • A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
    • C. Sangpachatanaruk, S. M. Khattab, T. Znati, R. Melhem, and D. Mosse, "A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks," In ANSS, 2003.
    • ANSS, 2003
    • Sangpachatanaruk, C.1    Khattab, S.M.2    Znati, T.3    Melhem, R.4    Mosse, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.