메뉴 건너뛰기




Volumn , Issue , 2010, Pages 226-230

Study on classification and characteristics of source address spoofing attacks in the internet

Author keywords

Backscatter packets; Network attacks; Source address spoofing

Indexed keywords

NETWORK ATTACK; NETWORK TELESCOPES; PARTIAL INFORMATION; SOURCE ADDRESS; SPOOFING ATTACKS; STATISTICAL ANALYSIS;

EID: 77954294167     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICN.2010.43     Document Type: Conference Paper
Times cited : (6)

References (41)
  • 2
    • 0003659019 scopus 로고    scopus 로고
    • November 29, [Online]. Available
    • Computer Emergency Response Team (CERT). (2000, November 29). TCP SYN flooding and IP spoofing attacks. [Online]. Available: http://www.cert.org/ advisories/CA-1996-21.html .
    • (2000) TCP SYN Flooding and IP Spoofing Attacks
  • 3
    • 0242457847 scopus 로고    scopus 로고
    • March, [Online]. Available
    • Computer Emergency Response Team(CERT). ( 2000, March). Smurf IP Denial-of-Service Attacks. [Online]. Available: http://www/cert.org/advisories/ CA-1998-01.html.
    • (2000) Smurf IP Denial-of-Service Attacks
  • 5
    • 69249204694 scopus 로고    scopus 로고
    • March 11, [Online]. Available
    • Tanase M. (2003, March 11). IP Spoofing an Introduction. [Online]. Available: http://www.securityfocus.com/infocus/1674 .
    • (2003) IP Spoofing An Introduction
    • Tanase, M.1
  • 6
    • 3042686301 scopus 로고    scopus 로고
    • A graphbased methodology for analyzing ip spoofing attack. [C]
    • March
    • V. Santiraveewan, Y. Permpoontanalarp. (2004,March) A Graphbased Methodology for Analyzing IP Spoofing Attack. [C]. 18th AINA, pp227-231.
    • (2004) 18th AINA , pp. 227-231
    • Santiraveewan, V.1    Permpoontanalarp, Y.2
  • 9
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. [C]
    • August 2001
    • K. Park, H. Lee. (2001, August) On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. [C]. ACM SIGCOMM 2001.
    • (2001) ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 11
    • 37349125374 scopus 로고    scopus 로고
    • DDoS attack detection method using cluster analysis. [J]
    • K. Lee, J. Kim, K.H. Kwon, et al. (2008). DDoS attack detection method using cluster analysis. [J]. Expert Systems with Applications 34, pp1659-1665.
    • (2008) Expert Systems with Applications , vol.34 , pp. 1659-1665
    • Lee, K.1    Kim, J.2    Kwon, K.H.3
  • 12
    • 69249207054 scopus 로고    scopus 로고
    • Defenses against TCP SYN flooding attacks. [J]
    • Dec.
    • W. Eddy. (2006, Dec.). Defenses Against TCP SYN Flooding Attacks. [J]. The Internet Protocol Journal, Volume 9, No.4.
    • (2006) The Internet Protocol Journal , vol.9 , Issue.4
    • Eddy, W.1
  • 13
    • 33750958535 scopus 로고    scopus 로고
    • Defending against TCP SYN flooding attacks under different types of IP spoofing [C]
    • Jan
    • W. Chen, D. Y. Yeung. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing [C]. ICN/ICONS/MCL Jan 2006, pp38-43.
    • (2006) ICN/ICONS/MCL , pp. 38-43
    • Chen, W.1    Yeung, D.Y.2
  • 14
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed ip traffic using hop-count filtering. [J]
    • February
    • H. Wang, G. Jin, K. G. Shin. Defense Against Spoofed IP Traffic Using Hop-Count Filtering. [J]. IEEE/ACM Transactions on Networking, Vol 15, No 1, February 2007.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1
    • Wang, H.1    Jin, G.2    Shin, K.G.3
  • 17
    • 77954254768 scopus 로고    scopus 로고
    • [Online]. Available
    • MIT IP Spoofer Project website. [Online]. Available: http://spoofer. csail.mit.edu/summary.php.
    • MIT IP Spoofer Project Website
  • 18
    • 77954278030 scopus 로고
    • An environment for "sniffing" DCE-RPC traffic
    • June 21, [Online]. Available
    • J. Howe. (1993, June 21). An Environment for "Sniffing" DCE-RPC Traffic, CITI Technical Report 93-94 [Online]. Available: http://www.citi. umich.edu/techreports/reports/citi-tr-93-4.pdf.
    • (1993) CITI Technical Report , pp. 93-94
    • Howe, J.1
  • 19
    • 77954301912 scopus 로고    scopus 로고
    • Dec. [Online]. Available
    • F. Ali. (2007, Dec.) IP Spoofing. [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived-issues/ipj-10-4/ 104-ip-spoofing.html.
    • (2007) IP Spoofing
    • Ali, F.1
  • 21
    • 77954270167 scopus 로고    scopus 로고
    • Oct 18, [Online]. Available
    • Bogon list sources. (Oct 18, 2003). [Online]. Available: http://www.completewhois.com/bogons/.
    • (2003) Bogon List Sources
  • 25
    • 27544436002 scopus 로고    scopus 로고
    • Mar 7, [Online]. Available
    • J. Barlow, W. Thrower. (2000, Mar 7). TFN2K-An Analysis. [Online]. Available: http://www.packetstormsecurity.org/distributed/TFN2k-Analysis-1.3. txt.
    • (2000) TFN2K-An Analysis
    • Barlow, J.1    Thrower, W.2
  • 27
    • 77954260368 scopus 로고    scopus 로고
    • [Online]. Available
    • Cisco IOS, (2005). Unicast reverse path forwarding. [Online]. Available: http://www.cisco.com/en/US/docs/ios/12-2t/12-2t13/feature/guide/ft-urpf. html#wp1048141.
    • (2005) Unicast Reverse Path Forwarding
  • 28
    • 33750699316 scopus 로고    scopus 로고
    • New architecture for intra-domain network security issues. [J]
    • Nov
    • D. Huang, Q. Cao, A. Sinha, et al. New Architecture For Intra-Domain Network Security Issues. [J]. Communications of the ACM, Nov 2006, pp64-72.
    • (2006) Communications of the ACM , pp. 64-72
    • Huang, D.1    Cao, Q.2    Sinha, A.3
  • 29
    • 77954259737 scopus 로고    scopus 로고
    • (Jun 5). [Online]. Available
    • Definition of man-in-the-middle. (2007, Jun 5). [Online]. Available: http://searchsecurity.techtarget.com/sDefinition/0sid14-gci499492,00.html.
    • (2007) Definition of Man-in-the-middle
  • 32
    • 0003608455 scopus 로고
    • Internet control message protocol
    • Sep. [Online]. Available
    • J. Postel. (1981, Sep.). Internet control message protocol, DARPA Internet program protocol specification. [Online]. Available: http://www.ietf.org/rfc/rfc792.txt?number=792 .
    • (1981) DARPA Internet Program Protocol Specification
    • Postel, J.1
  • 33
    • 77954303864 scopus 로고    scopus 로고
    • [Online]. Available
    • Tcpipguide. [Online]. Available: http://www.tcpipguide.com/
  • 36
  • 37
    • 84874126880 scopus 로고    scopus 로고
    • [Online] Available
    • The Spamhaus Project [Online]. Available: http://www.spamhaus.org/.
    • The Spamhaus Project
  • 40
    • 77954278961 scopus 로고    scopus 로고
    • Analysis of Network Denial of Service, (Nov.) [Online]. Available
    • Analysis of Network Denial of Service. (2004, Nov.) [Online]. Available: http://www.ufsdump.org/papers/uuasc-novemberddos.pdf.
    • (2004)
  • 41
    • 48649106122 scopus 로고    scopus 로고
    • Apr. [Online]. Available
    • C. Kalt. (2000, Apr.). Internet relay chat: Architecture. [Online]. Available: http://www.ietf.org/rfc/rfc2810.txt?number=2810.
    • (2000) Internet Relay Chat: Architecture
    • Kalt, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.