메뉴 건너뛰기




Volumn , Issue , 2009, Pages 269-278

RAD: Reflector attack defense using message authentication codes

Author keywords

DoS; IP spoofing; MAC; RAD; Reflector attack

Indexed keywords

DENIAL OF SERVICE ATTACKS; IP SPOOFING; MAC; MESSAGE AUTHENTICATION CODES; NETWORK CAPACITY; REFLECTOR ATTACKS; SERVICE REQUESTS; TARGET MACHINES;

EID: 77950819080     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.32     Document Type: Conference Paper
Times cited : (11)

References (36)
  • 2
    • 24944515425 scopus 로고    scopus 로고
    • Victim-assisted Mitigation Technique for TCP-Based Refelector DDoS Attacks
    • D. Basheer and G. Manimaran. Victim-assisted Mitigation Technique for TCP-Based Refelector DDoS Attacks. In 4th IFIP-TC6, Networking, pages 191-204, 2005.
    • (2005) 4th IFIP-TC6, Networking , pp. 191-204
    • Basheer, D.1    Manimaran, G.2
  • 6
    • 38049106551 scopus 로고    scopus 로고
    • Finding SHA-1 Characteristics: General Results and Applications
    • C. De Cannière and C. Rechberger. Finding SHA-1 Characteristics: General Results and Applications. In ASIACRYPT, 2006.
    • (2006) ASIACRYPT
    • De Cannière, C.1    Rechberger, C.2
  • 7
    • 39049160574 scopus 로고    scopus 로고
    • Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
    • Z. Duan, X. Yuan, and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM, 2006.
    • (2006) INFOCOM
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 16
    • 77950795295 scopus 로고    scopus 로고
    • A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512
    • R. Lien, T. Grembowksi, and K. Gaj. A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. In RSA Cryptographers' Track, 2004.
    • (2004) RSA Cryptographers' Track
    • Lien, R.1    Grembowksi, T.2    Gaj, K.3
  • 17
    • 66249102841 scopus 로고    scopus 로고
    • To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets
    • X. Liu, X. Yang, and Y. Lu. To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets. In ACM SIGCOMM, 2008.
    • (2008) ACM SIGCOMM
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 18
    • 38049148364 scopus 로고    scopus 로고
    • Efficient and Secure Source Authentication with Packet Passports
    • X. Liu, X. Yang, D. Wetherall, and T. Anderson. Efficient and Secure Source Authentication with Packet Passports. In SRUTI, 2006.
    • (2006) SRUTI
    • Liu, X.1    Yang, X.2    Wetherall, D.3    Anderson, T.4
  • 21
    • 0001083965 scopus 로고    scopus 로고
    • On the Effectiveness of Route-Based Filtering for Distributed DoS Attack Prevention in Power-Law Internets
    • K. Park and H. Lee. On the Effectiveness of Route-Based Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In ACM SIGCOMM, 2001.
    • (2001) ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 22
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denialof- Service Attacks
    • V. Paxson. An Analysis of Using Reflectors for Distributed Denialof- Service Attacks. In ACM SIGCOMM Computer Communications Review, 2001.
    • (2001) ACM SIGCOMM Computer Communications Review
    • Paxson, V.1
  • 24
    • 33749831619 scopus 로고    scopus 로고
    • StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
    • October
    • A. Perrig, D. Song, and A. Yaar. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications, 24(10):1853-1863, October 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1853-1863
    • Perrig, A.1    Song, D.2    Yaar, A.3
  • 28
    • 42049090373 scopus 로고    scopus 로고
    • Packet Forwarding with Source Verification
    • C. A. Shue, M. Gupta, and M. P. Davy. Packet Forwarding with Source Verification. Computer Networks, 52(8):1567-1582, 2008.
    • (2008) Computer Networks , vol.52 , Issue.8 , pp. 1567-1582
    • Shue, C.A.1    Gupta, M.2    Davy, M.P.3
  • 32
    • 77950805032 scopus 로고    scopus 로고
    • Advanced Network Architecture Group. ANA Spoofer Project
    • Advanced Network Architecture Group. ANA Spoofer Project. http://spoofer.csail.mit.edu.
  • 33
    • 77950815235 scopus 로고    scopus 로고
    • CAIDA CoralReef. http://www.caida.org/tools/measurement/.
  • 34
  • 35
    • 77950788049 scopus 로고    scopus 로고
    • MAWI Working Group Traffic Archive. http://mawi.wide.ad.jp.
  • 36
    • 77950834867 scopus 로고    scopus 로고
    • Tcpdump. http://www.tcpdump.org/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.