메뉴 건너뛰기




Volumn 7, Issue 1, 2010, Pages 5-19

A puzzle-based defense strategy against flooding attacks using game theory

Author keywords

Availability; Client puzzle approach; Flooding DoS attack; Game theory; Reliability; Serviceability

Indexed keywords

AVAILABILITY; DENIAL-OF-SERVICE ATTACK; FLOODS; NETWORK SECURITY; RELIABILITY; RELIABILITY THEORY;

EID: 76949106169     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2008.13     Document Type: Article
Times cited : (54)

References (36)
  • 3
    • 1542273553 scopus 로고    scopus 로고
    • A framework for the analysis of denial of service attacks
    • Mar.
    • A.R. Sharafat and M.S. Fallah, "A Framework for the Analysis of Denial of Service Attacks," The Computer J., vol.47, no.2, pp. 179-192, Mar. 2004.
    • (2004) The Computer J. , vol.47 , Issue.2 , pp. 179-192
    • Sharafat, A.R.1    Fallah, M.S.2
  • 5
    • 0013240874 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon Univ.
    • Smurf IP Denial-of-Service Attacks. CERT Coordination Center, Carnegie Mellon Univ., 1998.
    • (1998) Smurf IP Denial-of-Service Attacks
  • 6
    • 0009600844 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon Univ.
    • Denial-of-Service Tools. CERT Coordination Center, Carnegie Mellon Univ., 1999.
    • (1999) Denial-of-Service Tools
  • 7
    • 0011224227 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon Univ.
    • Denial-of-Service Attack via Ping. CERT Coordination Center, Carnegie Mellon Univ., 1996.
    • (1996) Denial-of-Service Attack Via Ping
  • 8
    • 0011192575 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon Univ.
    • IP Denial-of-Service Attacks. CERT Coordination Center, Carnegie Mellon Univ., 1997.
    • (1997) IP Denial-of-Service Attacks
  • 9
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Apr.
    • J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communication Rev., vol.34, no.2, pp. 39-53, Apr. 2004.
    • (2004) ACM SIGCOMM Computer Communication Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 12
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. Song and A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM '01, pp. 878-886, 2001.
    • (2001) Proc. IEEE INFOCOM '01 , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 13
    • 0037810705 scopus 로고    scopus 로고
    • PI: A path identification mechanism to defend against DDoS attacks
    • A. Yaar, A. Perrig, and D. Song, "PI: A Path Identification Mechanism to Defend Against DDoS Attacks," Proc. IEEE Symp. Security and Privacy, pp. 93-109, 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 93-109
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 16
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
    • A. Yaar, D. Song, and A. Perrig, "SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," Proc. IEEE Symp. Security and Privacy, pp. 130-146, 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 130-146
    • Yaar, A.1    Song, D.2    Perrig, A.3
  • 17
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • July/Sept.
    • J. Mirkovic and P. Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks," IEEE Trans. Dependable and Secure Computing, vol.2, no.3, pp. 216-232, July/Sept. 2005.
    • (2005) IEEE Trans. Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 19
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • Jan.
    • C. Meadows, "A Cost-Based Framework for Analysis of Denial of Service in Networks," J. Computer Security, vol.9, nos. 1-2, pp. 143-164, Jan. 2001.
    • (2001) J. Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 28
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • X. Wang and M. Reiter, "Defending Against Denial-of-Service Attacks with Puzzle Auctions," Proc. IEEE Security and Privacy, pp. 78-92, 2003.
    • (2003) Proc. IEEE Security and Privacy , pp. 78-92
    • Wang, X.1    Reiter, M.2
  • 32
    • 0000028492 scopus 로고
    • The folk theorem for repeated games with discounting and incomplete information
    • May
    • D. Fudenberg and E. Maskin, "The Folk Theorem for Repeated Games with Discounting and Incomplete Information," Econometrica, vol.54, no.3, pp. 533-554, May 1986.
    • (1986) Econometrica , vol.54 , Issue.3 , pp. 533-554
    • Fudenberg, D.1    Maskin, E.2
  • 34
    • 34250133690 scopus 로고
    • Note on nash equilibria in infinitely repeated games with incomplete information
    • Sept.
    • F. Forges, "Note on Nash Equilibria in Infinitely Repeated Games with Incomplete Information," Int'l J. Game Theory, vol.13, no.3, pp. 179-187, Sept. 1984.
    • (1984) Int'l J. Game Theory , vol.13 , Issue.3 , pp. 179-187
    • Forges, F.1
  • 35
    • 0001522622 scopus 로고
    • Nonzerosum two-person repeated games with incomplete information
    • Feb.
    • S. Hart, "Nonzerosum Two-Person Repeated Games with Incomplete Information," Math. of Operations Research, vol.10, no.1, pp. 117-153, Feb. 1985.
    • (1985) Math. of Operations Research , vol.10 , Issue.1 , pp. 117-153
    • Hart, S.1
  • 36
    • 70350099314 scopus 로고
    • Repeated games of incomplete information: Non-zero sum
    • R. Aumann and S. Hart, eds., Elsevier Science
    • F. Forges, "Repeated Games of Incomplete Information: Non-Zero Sum," Handbook of Game Theory, R. Aumann and S. Hart, eds., vol.1, pp. 155-177, Elsevier Science, 1992.
    • (1992) Handbook of Game Theory , vol.1 , pp. 155-177
    • Forges, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.