메뉴 건너뛰기




Volumn , Issue , 2010, Pages

DDoS defense deployment with Network Egress and Ingress Filtering

Author keywords

[No Author keywords available]

Indexed keywords

BLOOM FILTERS; DDOS ATTACK; DEFENSE ARCHITECTURE; EDGE ROUTERS; FAIR SHARE; IMPLEMENTATION COMPLEXITY; INGRESS FILTERING; LINK SPEED; PARTIAL DEPLOYMENT; PLANETLAB;

EID: 77955376540     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2010.5502654     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 1
    • 85084163167 scopus 로고    scopus 로고
    • Multops: A data-structure for bandwidth attack detection
    • T. M. Gil and M. Poletter, "Multops: a data-structure for bandwidth attack detection," in USENIX Security, 2001.
    • (2001) USENIX Security
    • Gil, T.M.1    Poletter, M.2
  • 3
    • 68149178268 scopus 로고    scopus 로고
    • Ip packet size entropy-based scheme for detection of dos/ddos attacks
    • P. DU and S. Abe, "Ip packet size entropy-based scheme for detection of dos/ddos attacks," IEICE Trans Inf. & Syst, vol. 5, pp. 1274-1281, 2008.
    • (2008) IEICE Trans Inf. & Syst , vol.5 , pp. 1274-1281
    • Du, P.1    Abe, S.2
  • 4
    • 77955352989 scopus 로고    scopus 로고
    • Pay-as-you-admit: A new charging model of cloud computing
    • P. Du, M. Chen, and A. Nakao, "Pay-as-you-admit: A new charging model of cloud computing," in ICOIN, 2010.
    • (2010) ICOIN
    • Du, P.1    Chen, M.2    Nakao, A.3
  • 6
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," in USENIX SECURITY, 1998.
    • (1998) USENIX SECURITY
    • Paxson, V.1
  • 7
    • 1642293015 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • M. Roesch, "Snort - lightweight intrusion detection for networks," in USENIX LISA, 1999.
    • (1999) USENIX LISA
    • Roesch, M.1
  • 8
    • 77957788301 scopus 로고    scopus 로고
    • Ddos defense as a network service
    • P. Du and A. Nakao, "Ddos defense as a network service," in IEEE/IFIP NOMS, 2010.
    • (2010) IEEE/IFIP NOMS
    • Du, P.1    Nakao, A.2
  • 9
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing," in IETF, RFC 2827, 1998.
    • (1998) IETF, RFC 2827
    • Ferguson, P.1    Senie, D.2
  • 10
    • 84976477986 scopus 로고    scopus 로고
    • "Spoofer project," http://spoofer.csail.mit.edu/.
    • Spoofer Project
  • 13
    • 17744383634 scopus 로고    scopus 로고
    • Controlling high-bandwidth flows at the congested router
    • R. Mahajan, S. Floyd, and D. Wetherall, "Controlling high-bandwidth flows at the congested router," in IEEE ICNP, 2001.
    • (2001) IEEE ICNP
    • Mahajan, R.1    Floyd, S.2    Wetherall, D.3
  • 15
    • 84871993728 scopus 로고    scopus 로고
    • "Cisco netflow," http://www.cisco.com/web/go/netflow.
    • Cisco Netflow
  • 16
    • 77955358592 scopus 로고    scopus 로고
    • Arbor Network, "peakflow," http://arbornetworks.com.
    • Peakflow
  • 18
    • 77955392341 scopus 로고    scopus 로고
    • "Planetlab," http://www.planet-lab.org/.
  • 19
    • 77955344424 scopus 로고    scopus 로고
    • "Netperf," http://www.netperf.org/.
  • 21
    • 36048986923 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
    • S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, "Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds," in USENIX NSDI, 2005.
    • (2005) USENIX NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.W.4
  • 22
    • 3042859154 scopus 로고    scopus 로고
    • Resisting syn fooding dos attacks with a syn cache
    • J. Lemon, "Resisting syn fooding dos attacks with a syn cache," in USENIX BSDCon, 2002.
    • (2002) USENIX BSDCon
    • Lemon, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.