메뉴 건너뛰기




Volumn 17, Issue 4, 2009, Pages 1284-1297

Scalable network-layer defense against internet bandwidth-flooding attacks

Author keywords

Denial of service defenses; Network level security and protection; Traffic filtering

Indexed keywords

DEFENSE MECHANISM; DENIAL-OF-SERVICE DEFENSES; INTERNET TRAFFIC; MOORE'S LAW; NETWORK-LEVEL SECURITY AND PROTECTION; SCALABLE NETWORKS; TRAFFIC FILTERING;

EID: 69249233518     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2008.2007431     Document Type: Article
Times cited : (58)

References (31)
  • 1
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate targeted TCP denial-ofservice attacks (The shrew vs. the mice and elephants)
    • Karlsruhe, Germany, Aug
    • A. Kuzmanovic and E. Knightly, "Low-rate targeted TCP denial-ofservice attacks (The shrew vs. the mice and elephants)," in Proc. ACM SIGCOMM, Karlsruhe, Germany, Aug. 2003.
    • (2003) Proc. ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.2
  • 3
    • 69249201931 scopus 로고    scopus 로고
    • S. Berinato, Online Extortion. [Online]. Available: http:// www.csoonline.com/read/050105/extortion.html
    • S. Berinato, Online Extortion. [Online]. Available: http:// www.csoonline.com/read/050105/extortion.html
  • 9
    • 84886371697 scopus 로고    scopus 로고
    • Online, Available
    • Mazu Enforcer. [Online]. Available: http://www.mazunetworks.com/ products/mazu-enforcer.php
    • Mazu Enforcer
  • 10
    • 69249218561 scopus 로고    scopus 로고
    • Online, Available: \url{http
    • Peakflow X Data Sheet. [Online]. Available: \url{http://arbornetworks. com/downloads/Arbor_Peakflow_X_Data_Sheet.pdf
    • Data Sheet, P.X.1
  • 12
    • 69249220927 scopus 로고    scopus 로고
    • D. Bernstein, SYN Cookies. [Online]. Available: http://cr.yp.to/ syncookies.html
    • D. Bernstein, SYN Cookies. [Online]. Available: http://cr.yp.to/ syncookies.html
  • 13
    • 69249222175 scopus 로고    scopus 로고
    • Scalable defense against internet bandwidth-flooding attacks,
    • Ph.D. dissertation, Stanford Univ, Stanford, CA, Dec
    • K. Argyraki, "Scalable defense against internet bandwidth-flooding attacks," Ph.D. dissertation, Stanford Univ., Stanford, CA, Dec. 2006.
    • (2006)
    • Argyraki, K.1
  • 16
    • 33747017801 scopus 로고    scopus 로고
    • A. Markopoulou, F. Tobagi, and M. Karam, Loss and delay measurements of internet backbones, Elsevier Computer Commun., Special Issue on Measurements and Monitoring of IP Networks, 29, pp. 1590-1604, Jun. 2006.
    • A. Markopoulou, F. Tobagi, and M. Karam, "Loss and delay measurements of internet backbones," Elsevier Computer Commun., Special Issue on Measurements and Monitoring of IP Networks, vol. 29, pp. 1590-1604, Jun. 2006.
  • 17
    • 51349126234 scopus 로고    scopus 로고
    • Spatial-temporal characteristics of internet malicious sources
    • Phoenix, AZ, Apr
    • Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of internet malicious sources," in Proc. IEEE INFOCOM Mini-Conference Phoenix, AZ, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM Mini-Conference
    • Chen, Z.1    Ji, C.2    Barford, P.3
  • 19
    • 0012315198 scopus 로고    scopus 로고
    • On inferring autonomous system relationships in the internet
    • San Francisco, CA, Nov
    • L. Gao, "On inferring autonomous system relationships in the internet," in Proc. Global Internet Symp., San Francisco, CA, Nov. 2000.
    • (2000) Proc. Global Internet Symp
    • Gao, L.1
  • 26
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
    • Oakland, CA, May
    • A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 30
    • 36949036429 scopus 로고    scopus 로고
    • Portcullis: Protecting connection setup from denial-of-capability attacks
    • Kyoto, Japan, Aug
    • B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu, "Portcullis: Protecting connection setup from denial-of-capability attacks," in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.
    • (2007) Proc. ACM SIGCOMM
    • Parno, B.1    Wendlandt, D.2    Shi, E.3    Perrig, A.4    Maggs, B.5    Hu, Y.-C.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.