메뉴 건너뛰기




Volumn 53, Issue 7, 2010, Pages 1020-1037

Protection against denial of service attacks: A survey

Author keywords

computer networks; denial of service; network security

Indexed keywords

DEFENCE MECHANISMS; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; DOS PROTECTION; INCOMING TRAFFIC; LITERATURE REVIEWS; MATHEMATICAL MODELLING; NETWORK RESOURCE; NEW DIRECTIONS; PROTECTION MECHANISMS; TRACEBACK;

EID: 77955689268     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxp078     Document Type: Article
Times cited : (98)

References (114)
  • 1
    • 0020915186 scopus 로고
    • A Note on the denial-of-service problem
    • Oakland, CA, USA, April 25-27 IEEE Computer Society, Washington, DC, USA
    • Gilgor, V. (1983) A Note on the Denial-of-Service Problem. Proc. Symp. Security and Privacy (SP'83), Oakland, CA, USA, April 25-27, pp. 139-149. IEEE Computer Society, Washington, DC, USA.
    • (1983) Proc. Symp. Security and Privacy (SP'83) , pp. 139-149
    • Gilgor, V.1
  • 2
    • 0003804730 scopus 로고
    • A weakness in the 4.2bsd unix tcp/ip software
    • AT&T Bell Labs, Murray Hills, NJ, USA
    • Morris, R.T. (1985) A Weakness in the 4.2BSD Unix TCP/IP Software. Computer Science Technical Report 117,AT&T Bell Labs, Murray Hills, NJ, USA.
    • (1985) Computer Science Technical Report 117
    • Morris, R.T.1
  • 3
    • 1542386294 scopus 로고    scopus 로고
    • ISS Realsecure pushes past newer IDS players
    • Shipley, G. (1999) ISS RealSecure pushes past newer IDS players. Netw. Comput., 10, 95-111.
    • (1999) Netw. Comput. , vol.10 , pp. 95-111
    • Shipley, G.1
  • 4
    • 51349112877 scopus 로고    scopus 로고
    • Detection syn flooding attacks using fuzzy logic
    • IEEE Computer Society, NewYork, NY, USA Washington, DC, USA, April 24-26
    • Tuncer, T. and Tatar,Y. (2008) Detection SYN Flooding Attacks Using Fuzzy Logic. Proc. Int. Conf. Information Security and Assurance (ISA'08), Washington, DC, USA, April 24-26, pp. 321-325. IEEE Computer Society, NewYork, NY, USA.
    • (2008) Proc. Int. Conf. Information Security and Assurance (ISA'08) , pp. 321-325
    • Tuncer, T.1    Tatar, Y.2
  • 5
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • Mirkovic, J. and Reiher, P. (2005) D-WARD: A source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secur. Comput., 2, 216-232.
    • (2005) IEEE Trans. Dependable Secur. Comput. , vol.2 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 6
    • 48749093494 scopus 로고    scopus 로고
    • A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification
    • Asosheh, A. and Ramezani, N. (2008) A comprehensive taxonomy of DDoS attacks and defense mechanism applying in a smart classification. WSEAS Trans. Comput., 7, 281-290.
    • (2008) WSEAS Trans. Comput. , vol.7 , pp. 281-290
    • Asosheh, A.1    Ramezani, N.2
  • 8
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Paxson,V. (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACMSIGCOMMs Comput. Commun. Rev., 31, 38-47.
    • (2001) ACMSIGCOMMs Comput. Commun. Rev. , vol.31 , pp. 38-47
    • Paxson, V.1
  • 10
  • 11
  • 12
    • 34547969527 scopus 로고    scopus 로고
    • The new front line: Estonia under cyberassault
    • Lesk, M. (2007) The new front line: Estonia under cyberassault. IEEE Secur. Priv., 5, 76-79.
    • (2007) IEEE Secur. Priv. , vol.5 , pp. 76-79
    • Lesk, M.1
  • 13
    • 24644453625 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
    • Jalili, R., Imani-Mehr, F., Amini, M. and Shahriari, H.-R. (2005) Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks. Lect. Notes Comput. Sci., 3439, 192-203.
    • (2005) Lect. Notes Comput. Sci. , vol.3439 , pp. 192-203
    • Jalili, R.1    Imani-Mehr, F.2    Amini, M.3    Shahriari, H.-R.4
  • 14
    • 16644393989 scopus 로고    scopus 로고
    • Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
    • Gavrilis, D. and Dermatas, E. (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Netw. ISDN Syst., 48, 235-245.
    • (2005) Comput. Netw. ISDN Syst. , vol.48 , pp. 235-245
    • Gavrilis, D.1    Dermatas, E.2
  • 15
    • 9444219650 scopus 로고    scopus 로고
    • Feature selection for robust detection of distributed denial-of-service attacks using genetic algorithms
    • Gavrilis, D., Tsoulos, I. and Dermatas, E. (2004) Feature selection for robust detection of distributed denial-of-service attacks using genetic algorithms. Lect. Notes Artif. Intell., 3025, 276-281.
    • (2004) Lect. Notes Artif. Intell. , vol.3025 , pp. 276-281
    • Gavrilis, D.1    Tsoulos, I.2    Dermatas, E.3
  • 16
    • 33745767769 scopus 로고    scopus 로고
    • Construction of high precision RBFNN with low false alarm for detecting flooding based denial of service attacks using stochastic sensitivity measure
    • Ng,W., Chan, A.,Yeung, D. and Tsang, E. (2006) Construction of high precision RBFNN with low false alarm for detecting flooding based denial of service attacks using stochastic sensitivity measure. Lect. Notes Artif. Intell., 3930, 851-860.
    • (2006) Lect. Notes Artif. Intell. , vol.3930 , pp. 851-860
    • Ng, W.1    Chan, A.2    Yeung, D.3    Tsang, E.4
  • 17
    • 33745301184 scopus 로고    scopus 로고
    • Multiple classifier system with feature grouping for intrusion detection: Mutual information approach
    • Chan, A., Ng, W., Yeung, D.S. and Tsang, E. (2005) Multiple classifier system with feature grouping for intrusion detection: Mutual information approach. Lect. Notes Artif. Intell., 3683, 141-148.
    • (2005) Lect. Notes Artif. Intell. , vol.3683 , pp. 141-148
    • Chan, A.1    Ng, W.2    Yeung, D.S.3    Tsang, E.4
  • 18
    • 33745775880 scopus 로고    scopus 로고
    • Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection
    • Chan, A., Yeung, D., Tsang, E. and Ng, W. (2006) Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection. Lect. Notes Artif. Intell., 3930, 682-690.
    • (2006) Lect. Notes Artif. Intell. , vol.3930 , pp. 682-690
    • Chan, A.1    Yeung, D.2    Tsang, E.3    Ng, W.4
  • 19
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • Giacinto, G., Roli, F. and Didaci, L. (2003) Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognit. Lett., 24, 1795-1803.
    • (2003) Pattern Recognit. Lett. , vol.24 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 20
    • 10844230994 scopus 로고    scopus 로고
    • Intrusion detection using an ensemble of intelligent paradigms
    • Mukkamala, S., Sung, A.H. and Abraham, A. (2005) Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. Appl., 28, 167-182.
    • (2005) J. Netw. Comput. Appl. , vol.28 , pp. 167-182
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3
  • 21
    • 35048886560 scopus 로고    scopus 로고
    • Detecting distributed denial of service (DDoS) attacks through inductive learning
    • Noh, S., Lee, C., Choi, K. and Jung, G. (2003) Detecting distributed denial of service (DDoS) attacks through inductive learning. Lect. Notes Comput. Sci., 2690, 286-295.
    • (2003) Lect. Notes Comput. Sci. , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 22
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • Öke, G. and Loukas, G. (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J., 50, 717-727.
    • (2007) Comput. J. , vol.50 , pp. 717-727
    • Öke, G.1    Loukas, G.2
  • 23
    • 0000428263 scopus 로고
    • Learning in the recurrent random neural network
    • Gelenbe, E. (1993) Learning in the recurrent random neural network. Neural Comput., 5, 154-164.
    • (1993) Neural Comput. , vol.5 , pp. 154-164
    • Gelenbe, E.1
  • 24
    • 33745922681 scopus 로고    scopus 로고
    • A combined data mining approach for DDoS attack detection
    • Kim, M., Na, H. Chae, K., Bang, H., and Na, J. (2004) A combined data mining approach for DDoS attack detection. Lect. Notes Comput. Sci., 3090, 943-950.
    • (2004) Lect. Notes Comput. Sci. , vol.3090 , pp. 943-950
    • Kim, M.1    Na Chae H, K.2    Bang, H.3    Na, J.4
  • 25
    • 2442505788 scopus 로고    scopus 로고
    • Towards multisensor data fusion for dos detection
    • Nicosia, Cyprus, March 14-17 ACM, NewYork, NY, USA
    • Siaterlis, C. and Maglaris, B. (2004) Towards Multisensor Data Fusion for DoS Detection. Proc. Symp. Applied Computing (SAC'04), Nicosia, Cyprus, March 14-17, pp. 439-446. ACM, NewYork, NY, USA.
    • (2004) Proc. Symp. Applied Computing (SAC'04) , pp. 439-446
    • Siaterlis, C.1    Maglaris, B.2
  • 26
    • 27144490740 scopus 로고    scopus 로고
    • Detecting anomalous network traffic with combined fuzzy-based approaches
    • He, H., Luo, X. and Liu, B. (2005) Detecting anomalous network traffic with combined fuzzy-based approaches. Lect. Notes Comput. Sci., 3645, 433-442.
    • (2005) Lect. Notes Comput. Sci. , vol.3645 , pp. 433-442
    • He, H.1    Luo, X.2    Liu, B.3
  • 27
    • 24944522491 scopus 로고    scopus 로고
    • A probe detection model using the analysis of the fuzzy cognitive maps
    • Lee, S., Kim,Y., Lee, B., Kang, S. andYoun, C. (2005)A probe detection model using the analysis of the fuzzy cognitive maps. Lect. Notes Comput. Sci., 3480, 320-328.
    • (2005) Lect. Notes Comput. Sci. , vol.3480 , pp. 320-328
    • Kimy., L.S.1    Lee, B.2    Kang, S.3    Youn, C.4
  • 28
    • 33746639174 scopus 로고    scopus 로고
    • Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks
    • Wei, W., Dong, Y., Lu, D. and Jin, G. (2006) Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks. Lect. Notes Comput. Sci., 3994, 57-64.
    • (2006) Lect. Notes Comput. Sci. , vol.3994 , pp. 57-64
    • Wei, W.1    Dong, Y.2    Lu, D.3    Jin, G.4
  • 29
    • 9444289934 scopus 로고    scopus 로고
    • Computational intelligent techniques for detecting denial of service attacks
    • Springer, Berlin, Germany Ottawa, Canada, May 17-20
    • Mukkamala, S. and Sung, A.H. (2004) Computational Intelligent Techniques for Detecting Denial of Service Attacks. Proc. Conf. Innovations in Applied Artificial Intelligence (IEA/AIE'04), Ottawa, Canada, May 17-20, pp. 616-624. Springer, Berlin, Germany.
    • (2004) Proc. Conf. Innovations in Applied Artificial Intelligence (IEA/AIE'04) , pp. 616-624
    • Mukkamala, S.1    Sung, A.H.2
  • 30
    • 33947265693 scopus 로고    scopus 로고
    • The feature selection and intrusion detection problems
    • Sung, A. and Mukkamala, S. (2004) The feature selection and intrusion detection problems. Lect. Notes Comput. Sci., 3321, 468-482.
    • (2004) Lect. Notes Comput. Sci. , vol.3321 , pp. 468-482
    • Sung, A.1    Mukkamala, S.2
  • 31
    • 33746191250 scopus 로고    scopus 로고
    • Intrusion detection based on behaviour mining and machine learning techniques
    • Mukkamala, S., Xu, D. and Sung, A. (2006) Intrusion detection based on behaviour mining and machine learning techniques. Lect. Notes Artif. Intell., 4031, 619-628.
    • (2006) Lect. Notes Artif. Intell. , vol.4031 , pp. 619-628
    • Mukkamala, S.1    Xu, D.2    Sung, A.3
  • 32
    • 84949971733 scopus 로고    scopus 로고
    • Understanding the longterm self-similarity of internet traffic
    • Uhlig, S. and Bonaventure, O. (2001) Understanding the longterm self-similarity of internet traffic. Lect. Notes Comput. Sci., 2156, 286-298.
    • (2001) Lect. Notes Comput. Sci. , vol.2156 , pp. 286-298
    • Uhlig, S.1    Bonaventure, O.2
  • 33
    • 3142512777 scopus 로고    scopus 로고
    • DetectingDDOS attack based on network self-similarity
    • Xiang,Y., Lin,Y., Lei,W. and Huang, S. (2004) DetectingDDOS attack based on network self-similarity. IEE Proc., Commun., 151, 292-295.
    • (2004) IEE Proc., Commun. , vol.151 , pp. 292-295
    • Xiang, Y.1    Lin, Y.2    Lei, W.3    Huang, S.4
  • 35
    • 27144463992 scopus 로고    scopus 로고
    • Fractional Gaussian noise: A tool for characterizing traffic for detection purpose
    • Li, M., Chi, C.-H. and Long, D. (2004) Fractional Gaussian noise: A tool for characterizing traffic for detection purpose. Lect. Notes Comput. Sci., 3309, 94-103.
    • (2004) Lect. Notes Comput. Sci. , vol.3309 , pp. 94-103
    • Li, M.1    Chi, C.-H.2    Long, D.3
  • 36
    • 8344244591 scopus 로고    scopus 로고
    • Anapproach to reliably identifying signs ofDDOS flood attacks based on LRD traffic pattern recognition
    • Li, M. (2004)Anapproach to reliably identifying signs ofDDOS flood attacks based on LRD traffic pattern recognition. Comput. Secur., 23, 549-558.
    • (2004) Comput. Secur. , vol.23 , pp. 549-558
    • Li, M.1
  • 37
    • 0032167248 scopus 로고    scopus 로고
    • Self-similar processes in communications networks
    • Tsybakov, B. and Georganas, N. (1998) Self-similar processes in communications networks. IEEE Trans. Inf. Theory, 44, 1713-1725.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , pp. 1713-1725
    • Tsybakov, B.1    Georganas, N.2
  • 38
    • 0036343692 scopus 로고    scopus 로고
    • Detecting syn flooding attacks
    • IEEE Communications Society, NewYork, NY, USA, New York, NY, USA, June 23-27
    • Wang, H., Zhang, D. and Shin, K. (2002) Detecting SYN Flooding Attacks. Proc. INFOCOM'02, New York, NY, USA, June 23-27, pp. 1530-1539. IEEE Communications Society, NewYork, NY, USA.
    • (2002) Proc. INFOCOM'02 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.3
  • 39
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • Dallas, TX, USA, November 29- December 3
    • Siris, V. and Papagalou, F. (2004) Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks. Proc. GLOBECOM'04, Dallas, TX, USA, November 29- December 3, pp. 2050-2054.
    • (2004) Proc. GLOBECOM'04 , pp. 2050-2054
    • Siris, V.1    Papagalou, F.2
  • 40
    • 33744939733 scopus 로고    scopus 로고
    • Intrusion detection with CUSUM for TCP-based DDoS
    • Leu, F. and Yang, W. (2005) Intrusion detection with CUSUM for TCP-based DDoS. Lect. Notes Comput. Sci., 3823, 1255-1264.
    • (2005) Lect. Notes Comput. Sci. , vol.3823 , pp. 1255-1264
    • Leu, F.1    Yang, W.2
  • 41
    • 24644519473 scopus 로고    scopus 로고
    • An automatic and generic early-bird system for internet backbone based on traffic anomaly detection
    • Gu, R., Yan, P., Zou, T. and Guo, C. (2005) An automatic and generic early-bird system for internet backbone based on traffic anomaly detection. Lect. Notes Comput. Sci., 3420, 740-748.
    • (2005) Lect. Notes Comput. Sci. , vol.3420 , pp. 740-748
    • Gu, R.1    Yan, P.2    Zou, T.3    Guo, C.4
  • 42
    • 33646878980 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks using kolmogorov complexity metrics
    • Kulkarni, A. and Bush, S. (2006) Detecting distributed denial of service attacks using kolmogorov complexity metrics. J. Netw. Syst. Manage., 14, 69-80.
    • (2006) J. Netw. Syst. Manage. , vol.14 , pp. 69-80
    • Kulkarni, A.1    Bush, S.2
  • 43
    • 33744908603 scopus 로고    scopus 로고
    • Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation
    • Furuya, F., Matsuzaki, T. and Matsuura, K. (2005) Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation. Lect. Notes Comput. Sci., 3822, 395-406.
    • (2005) Lect. Notes Comput. Sci. , vol.3822 , pp. 395-406
    • Furuya, F.1    Matsuzaki, T.2    Matsuura, K.3
  • 44
    • 37349125374 scopus 로고    scopus 로고
    • DDoS attack detection method using cluster analysis
    • Lee, K., Kim, J., Kwon, K.H., Han, Y. and Kim, S. (2008) DDoS attack detection method using cluster analysis. Expert Syst. Appl., 34, 1659-1665.
    • (2008) Expert Syst. Appl. , vol.34 , pp. 1659-1665
    • Lee, K.1    Kim, J.2    Kwon, K.H.3    Han, Y.4    Kim, S.5
  • 45
    • 17444397467 scopus 로고    scopus 로고
    • DDoS attack detection and wavelets
    • Li, L. and Lee, G. (2005) DDoS attack detection and wavelets. Telecommun. Syst., 28, 435-451.
    • (2005) Telecommun. Syst. , vol.28 , pp. 435-451
    • Li, L.1    Lee, G.2
  • 46
    • 35048886720 scopus 로고    scopus 로고
    • A novel ddos attack detecting algorithm based on the continuous wavelet transform
    • Zhen Jiang, Jiang Su, China, November 15-17
    • Yang, X., Liu, Y., Zeng, M. and Shi, Y. (2004) A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. Proc. Advanced Workshop on Content Computing (AWCC'04), Zhen Jiang, Jiang Su, China, November 15-17, pp. 173-181.
    • (2004) Proc. Advanced Workshop on Content Computing (AWCC'04) , pp. 173-181
    • Yang, X.1    Liu, Y.2    Zeng, M.3    Shi, Y.4
  • 47
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • Lu,W. and Ghorbani, A.A. (2009) Network anomaly detection based on wavelet analysis. EURASIP J. Adv. Signal Process., 2009, 1-16.
    • (2009) EURASIP J. Adv. Signal Process. , vol.2009 , pp. 1-16
    • Lu, W.1    Ghorbani, A.A.2
  • 48
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • Kim, S.S. and Reddy, A.L.N. (2008) Statistical techniques for detecting traffic anomalies through packet header data. IEEE/ACM Trans. Netw., 16, 562-575.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 49
    • 38049152816 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks by sharing distributed belief
    • Peng, T., Leckie, C. and Ramamohanarao, K. (2003) Detecting distributed denial of service attacks by sharing distributed belief. Lect. Notes Comput. Sci., 2727, 214-225.
    • (2003) Lect. Notes Comput. Sci. , vol.2727 , pp. 214-225
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 50
    • 33646131107 scopus 로고    scopus 로고
    • Behavior based detection of unfavourable resource
    • Cetnarowicz, K. and Rojek, G. (2004) Behavior based detection of unfavourable resource. Lect. Notes Comput. Sci., 3038, 607-614.
    • (2004) Lect. Notes Comput. Sci. , vol.3038 , pp. 607-614
    • Cetnarowicz, K.1    Rojek, G.2
  • 51
    • 77955668195 scopus 로고    scopus 로고
    • Modeling and simulation for detecting a distributed denial of service attack
    • Canberra, Australia, September
    • Seo, H.S. and Cho, T.H. (2002) Modeling and Simulation for Detecting a Distributed Denial of Service Attack. Proc. Australian Joint Conf. Artificial Intelligence (AI'02), Canberra, Australia, September 16-21.
    • (2002) Proc. Australian Joint Conf. Artificial Intelligence (AI'02) , pp. 16-21
    • Seo, H.S.1    Cho, T.H.2
  • 53
    • 21244434788 scopus 로고    scopus 로고
    • Self-aware networks and QoS
    • Gelenbe, E., Lent, R. and Nunez,A. (2004) Self-aware networks and QoS. Proc. IEEE, 92, 1478-1489.
    • (2004) Proc. IEEE , vol.92 , pp. 1478-1489
    • Gelenbe, E.1    Lent, R.2    Nunez, A.3
  • 54
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering an effective defense against spoofed traffic
    • Washington, DC, USA, October 27-30 ACM, New York, NY, USA
    • Jing, S., Wang, H. and Shin, K. (2003) Hop-count filtering an effective defense against spoofed traffic. Proc. Int. Conf. Computer and Communications Security (CCS'03), Washington, DC, USA, October 27-30, pp. 30-41. ACM, New York, NY, USA.
    • (2003) Proc. Int. Conf. Computer and Communications Security (CCS'03) , pp. 30-41
    • Jing, S.1    Wang, H.2    Shin, K.3
  • 55
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Kim,Y., Lau,W., Chuah, M. and Chao, H. (2006) PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Dependable Secur. Comput., 3, 141-155.
    • (2006) IEEE Trans. Dependable Secur. Comput. , vol.3 , pp. 141-155
    • Kim, Y.1    Lau, W.2    Chuah, M.3    Chao, H.4
  • 56
    • 33749824252 scopus 로고    scopus 로고
    • ALPi: A DDoS defence system for high-speed networks
    • Ayres, P., Sun, H., Chao, H. and Lau,W. (2006) ALPi: a DDoS defence system for high-speed networks. IEEE J. Sel. Areas Commun., 24, 1864-1876.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , pp. 1864-1876
    • Ayres, P.1    Sun, H.2    Chao, H.3    Lau, W.4
  • 57
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a sip voip infrastructure: Attack scenarios and prevention mechanisms
    • Sisalem, D., Kuthan, J. and Ehlert, S. (2006) Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms. IEEE Netw., 20, 26-31.
    • (2006) IEEE Netw. , vol.20 , pp. 26-31
    • Sisalem, D.1    Kuthan, J.2    Ehlert, S.3
  • 58
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns andweb sites
    • Honolulu, HI, USA, May 7-11 ACM, NewYork, NY, USA
    • Jung, J., Krishnamurthy, B. and Rabinovich, M. (2002) Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs andWeb Sites. Proc. Conf. World Wide Web (WWW'02), Honolulu, HI, USA, May 7-11, pp. 553-561. ACM, NewYork, NY, USA.
    • (2002) Proc. Conf. World Wide Web (WWW'02) , pp. 553-561
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 60
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
    • Houston, TX, USA, April 4-6 USENIX Association, Berkeley, CA, USA
    • Kandula, S., Katabi, D., Jacob, M. and Berger, A. (2005) Botz-4-sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. Proc. Symp. Networked Systems Design and Implementation (NDSI'05), Houston, TX, USA, April 4-6, pp. 287-300. USENIX Association, Berkeley, CA, USA.
    • (2005) Proc. Symp. Networked Systems Design and Implementation (NDSI'05) , pp. 287-300
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 61
    • 0041431049 scopus 로고    scopus 로고
    • Recognizing objects in adversarial clutter-breaking avisualcaptcha
    • Madison, WI, USA, June 16-22
    • Mori, G. and Malik, J. (2003) Recognizing Objects in Adversarial Clutter-Breaking aVisualCAPTCHA.Proc. Conf. ComputerVision andPattern Recognition (CVPR'03), Madison, WI, USA, June 16-22, pp. 134-141.
    • (2003) Proc. Conf. ComputerVision AndPattern Recognition (CVPR'03) , pp. 134-141
    • Mori, G.1    Malik, J.2
  • 62
    • 40949163757 scopus 로고    scopus 로고
    • Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests
    • Gao, Z. and Ansari, N. (2006) Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests. Commun. Lett., 10, 793-795.
    • (2006) Commun. Lett. , vol.10 , pp. 793-795
    • Gao, Z.1    Ansari, N.2
  • 63
    • 34250620174 scopus 로고    scopus 로고
    • Netbouncer: Client-legitimacy-based high-performance ddos filtering
    • Washington, DC, USA, April 22-24 DARPA, Arlington, VA, USA
    • Thomas, R., Mark, B., Johnson, T. and Croall, J. (2003) Netbouncer: Client-Legitimacy-Based High-Performance DDoS Filtering. Proc. Information Survivability Conf. Exposition (DISCEX-III),Washington, DC, USA, April 22-24, pp. 14-25. DARPA, Arlington, VA, USA.
    • (2003) Proc. Information Survivability Conf. Exposition (DISCEX-III) , pp. 14-25
    • Thomas, R.1    Mark, B.2    Johnson, T.3    Croall, J.4
  • 64
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • San Diego, CA, USA, February The Internet Society,Washington, DC, USA
    • Juels, A. and Brainard, J. (1999) Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. Proc. Network and Distributed System Security Symp. (NDSS'99), San Diego, CA, USA, February, pp. 151-165. The Internet Society,Washington, DC, USA.
    • (1999) Proc. Network and Distributed System Security Symp. (NDSS'99) , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 65
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Aura, T., Nikander, P. and Leiwo, J. (2001) DOS-resistant authentication with client puzzles. Lect. Notes Comput. Sci., 2133, 170-177.
    • (2001) Lect. Notes Comput. Sci. , vol.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 66
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denialof- service attacks with puzzle auctions
    • Washington, DC, USA IEEE Computer Society, NewYork, NY, USA
    • Wang, X. and Reiter, M.K. (2003) Defending Against Denialof- Service Attacks with Puzzle Auctions. Proc. Symp. Security and Privacy (SP'03),Washington, DC, USA, pp. 78-92. IEEE Computer Society, NewYork, NY, USA.
    • (2003) Proc. Symp. Security and Privacy (SP'03) , pp. 78-92
    • Wang, X.1    Reiter, M.K.2
  • 67
    • 47649085264 scopus 로고    scopus 로고
    • A multi-layer framework for puzzle-based denial-of-service defense
    • Wang, X. and Reiter, M.K. (2008) A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Secur., 7, 243-263.
    • (2008) Int. J. Inf. Secur. , vol.7 , pp. 243-263
    • Wang, X.1    Reiter, M.K.2
  • 68
    • 51349125816 scopus 로고    scopus 로고
    • Live baiting for service-level dos attackers
    • Dublin, Ireland, April 13-19 IEEE Communications Society, NewYork, NY, USA
    • Khattab, S., Gobriel, S., Melhem, R. and Mosse, D. (2008) Live Baiting for Service-Level DOS Attackers. Proc. INFOCOM'08, Dublin, Ireland, April 13-19, pp. 171-175. IEEE Communications Society, NewYork, NY, USA.
    • (2008) Proc. INFOCOM'08 , pp. 171-175
    • Khattab, S.1    Gobriel, S.2    Melhem, R.3    Mosse, D.4
  • 71
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against ddos attacks
    • San Diego, CA, USA, February 6-8 The Internet Society, Washington, DC, USA
    • Ioannidis, J. and Bellovin, S. (2002) Implementing Pushback: Router-Based Defense Against DDoS Attacks. Proc. Network and Distributed System Security Symp. (NDSS'02), San Diego, CA, USA, February 6-8, pp. 1-12. The Internet Society, Washington, DC, USA.
    • (2002) Proc. Network and Distributed System Security Symp. (NDSS'02) , pp. 1-12
    • Ioannidis, J.1    Bellovin, S.2
  • 73
    • 2442567993 scopus 로고    scopus 로고
    • Mayday: Distributed dos filtering for internet services
    • Andersen, D. (2004) Mayday: Distributed DoS filtering for internet services. ACM SIGCOMM Comput. Commun. Rev., 34, 39-44.
    • (2004) ACM SIGCOMM Comput. Commun. Rev. , vol.34 , pp. 39-44
    • Andersen, D.1
  • 74
    • 84949199141 scopus 로고    scopus 로고
    • Mitigating distributed denial of service attacks with dynamic resource pricing
    • IEEE Computer Society, NewYork, NY, USA, Washington, DC, USA, December 10-14
    • Mankins, D., Krishnan, R., Boyd, C., Zao, J. and Frentz, M. (2001) Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing. Proc. Annual Computer Security Applications Conf. (ACSAC'01), Washington, DC, USA, December 10-14, pp. 411-421. IEEE Computer Society, NewYork, NY, USA.
    • (2001) Proc. Annual Computer Security Applications Conf. (ACSAC'01) , pp. 411-421
    • Mankins, D.1    Krishnan, R.2    Boyd, C.3    Zao, J.4    Frentz, M.5
  • 75
    • 7544248862 scopus 로고    scopus 로고
    • Mitigation of DoS attacks throughQoSregulation
    • Garg, A. and Reddy, A.N. (2004) Mitigation of DoS attacks throughQoSregulation. Microprocess. Microsyst., 28, 521-530.
    • (2004) Microprocess. Microsyst. , vol.28 , pp. 521-530
    • Garg, A.1    Reddy, A.N.2
  • 76
    • 1242350154 scopus 로고    scopus 로고
    • Protecting electronic commerce from distributed denial-of-service attacks
    • Honolulu, HI, USA, May 7-11 ACM, NewYork, NY, USA
    • Brustoloni, J. (2002) Protecting Electronic Commerce from Distributed Denial-of-Service Attacks. Proc. Conf. World Wide Web (WWW'02), Honolulu, HI, USA, May 7-11, pp. 553-561. ACM, NewYork, NY, USA.
    • (2002) Proc. Conf. World Wide Web (WWW'02) , pp. 553-561
    • Brustoloni, J.1
  • 81
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCPtargeted denial of service attacks and counter strategies
    • Kuzmanovic, A. and Knightly, E.W. (2006) Low-rate TCPtargeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw., 14, 683-696.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 82
    • 17744370129 scopus 로고    scopus 로고
    • Low-rate TCP denial-of-service attack detection at edge routers
    • Shevtekar, A., Anantharam, K. and Ansari, N. (2005) Low-rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9, 363-365.
    • (2005) IEEE Commun. Lett. , vol.9 , pp. 363-365
    • Shevtekar, A.1    Anantharam, K.2    Ansari, N.3
  • 83
    • 33745931152 scopus 로고    scopus 로고
    • On the effect of router buffer sizes on low-rate denial of service attacks
    • IEEE Computer Society, Washington, DC, USA, San Diego, CA, October
    • Sarat, S. and Terzis, A. (2005) On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks. Proc. Int. Conf. Computer Communications and Networks (ICCCN'05), San Diego, CA, October 17-19. IEEE Computer Society, Washington, DC, USA.
    • (2005) Proc. Int. Conf. Computer Communications and Networks (ICCCN'05) , pp. 17-19
    • Sarat, S.1    Terzis, A.2
  • 84
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • Chen, Y. and Hwang, K. (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. J. Parallel Distrib. Comput., 66, 1137-1151.
    • (2006) J. Parallel Distrib. Comput. , vol.66 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 85
  • 86
    • 33745436873 scopus 로고    scopus 로고
    • Users and services in intelligent networks
    • Gelenbe, E. (2005) Users and services in intelligent networks. Lect. Notes Comput. Sci., 3837, 30-45.
    • (2005) Lect. Notes Comput. Sci. , vol.3837 , pp. 30-45
    • Gelenbe, E.1
  • 87
    • 0035576358 scopus 로고    scopus 로고
    • Measurement and performance of a cognitive packet network
    • Gelenbe, E., Lent, R. and Xu, Z. (2001) Measurement and performance of a cognitive packet network. J. Comput. Netw., 37, 691-701.
    • (2001) J. Comput. Netw. , vol.37 , pp. 691-701
    • Gelenbe, E.1    Lent, R.2    Xu, Z.3
  • 90
    • 67650058534 scopus 로고    scopus 로고
    • Adaptive resilience of the cognitive packet network the presence of network worms
    • Bucharest, Romania, May NATO Research & Technology Organisation
    • Sakellari, G. and Gelenbe, E. (2009) Adaptive Resilience of the Cognitive Packet Network the Presence of Network Worms. Proc. NATO Symp. C3I for Crisis, Emergency and Consequence Management, Bucharest, Romania, May 11-12. NATO Research & Technology Organisation.
    • (2009) Proc. NATO Symp. C3I for Crisis, Emergency and Consequence Management , pp. 11-12
    • Sakellari, G.1    Gelenbe, E.2
  • 92
    • 58049174978 scopus 로고    scopus 로고
    • A multiple criteria, measurement-based admission control mechanism for self- aware networks
    • Hangzhou, China,August 25-27 IEEE, NewYork, NY, USA
    • Sakellari, G. and Gelenbe, E. (2008) A Multiple Criteria, Measurement-Based Admission Control Mechanism for Self- Aware Networks. Proc. Third Int. Conf. Communications and Networking China (CHINACOM'08), Hangzhou, China,August 25-27, pp. 1060-1064. IEEE, NewYork, NY, USA.
    • (2008) Proc. Third Int. Conf. Communications and Networking China (CHINACOM'08) , pp. 1060-1064
    • Sakellari, G.1    Gelenbe, E.2
  • 93
    • 17644385526 scopus 로고    scopus 로고
    • Defending networks against denial of service attacks
    • SPIE, BellinghamWA, USA, London, UK, October 25
    • Gelenbe, E., Gellman, M. and Loukas, G. (2004) Defending Networks Against Denial of Service Attacks. Proc. Conf. Optics/Photonics in Security and Defence (SPIE'04), London, UK, October 25,Vol. 5611, pp. 233-243. SPIE, BellinghamWA, USA.
    • (2004) Proc. Conf. Optics/Photonics in Security and Defence (SPIE'04) , vol.5611 , pp. 233-243
    • Gelenbe, E.1    Gellman, M.2    Loukas, G.3
  • 95
    • 33846199593 scopus 로고    scopus 로고
    • Self-aware approach to denial of service defence
    • Gelenbe, E. and Loukas, G. (2007) Self-aware approach to denial of service defence. Comput. Netw., 51, 1299-1314.
    • (2007) Comput. Netw. , vol.51 , pp. 1299-1314
    • Gelenbe, E.1    Loukas, G.2
  • 96
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • Internet Engineering Task Force, USA
    • Ferguson, P. and Senie, D. (2000) Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, Internet Engineering Task Force, USA.
    • (2000) RFC , pp. 2827
    • Ferguson, P.1    Senie, D.2
  • 98
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip traceback
    • Anchorage, AK, USA, April 22-26 IEEE Communications Society, NewYork, NY, USA
    • Song, D. and Perrig, A. (2001) Advanced and Authenticated Marking Schemes for IP Traceback. Proc. INFOCOM'01, Anchorage, AK, USA, April 22-26, pp. 878-886. IEEE Communications Society, NewYork, NY, USA.
    • (2001) Proc. INFOCOM'01 , pp. 878-886
    • Song, D.1    Perrig, A.2
  • 102
    • 84904907549 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: A novel technique for defending against internet ddos attacks
    • IEEE Computer Society,Washington, DC, USA, Paris, France, November 12-15
    • Sung, M. and Xu, J. (2002) IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks. Proc. Int. Conf. Network Protocols (ICNP'02), Paris, France, November 12-15, pp. 302-311. IEEE Computer Society,Washington, DC, USA.
    • (2002) Proc. Int. Conf. Network Protocols (ICNP'02) , pp. 302-311
    • Sung, M.1    Xu, J.2
  • 103
    • 3042825073 scopus 로고    scopus 로고
    • IP traceback: A new denial-of-service deterrent?
    • Aljifri, H. (2003) IP traceback: a new denial-of-service deterrent? IEEE Secur. Priv., 1, 24-31.
    • (2003) IEEE Secur Priv. , vol.1 , pp. 24-31
    • Aljifri, H.1
  • 104
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • New Orleans, LA, USA, December 3-8 USENIX Association, Berkeley, CA, USA
    • Burch, H. (2000) Tracing Anonymous Packets to their Approximate Source. Proc. Conf. System Administration (LISA'00), New Orleans, LA, USA, December 3-8, pp. 319- 328. USENIX Association, Berkeley, CA, USA.
    • (2000) Proc. Conf. System Administration (LISA'00) , pp. 319-328
    • Burch, H.1
  • 105
    • 0004304045 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip traceback
    • University of California, Berkeley, USA
    • Song, D. and Perrig, A. (2000) Advanced and Authenticated Marking Schemes for IP Traceback. Technical Report UCB/CSD-00-1107, University of California, Berkeley, USA.
    • (2000) Technical Report UCB/CSD-00-1107
    • Song, D.1    Perrig, A.2
  • 107
  • 109
    • 51649130217 scopus 로고    scopus 로고
    • A more practical approach for single-packet IP traceback using packet logging and marking
    • Gong, C. and Sarac, K. (2008) A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans. Parallel Distrib. Syst., 19, 1310-1324.
    • (2008) IEEE Trans. Parallel Distrib. Syst. , vol.19 , pp. 1310-1324
    • Gong, C.1    Sarac, K.2
  • 112
    • 54249125130 scopus 로고    scopus 로고
    • Queueing analysis for networks under dos attack
    • Perugia, Italy, June 30-July 3 Springer, Berlin/Heidelberg, Germany
    • Aissani, A. (2008) Queueing Analysis for Networks Under DoS Attack. Proc. Int. Conf. Computational Science and its Applications (ICCSA'08), Part II, Perugia, Italy, June 30-July 3, pp. 500-513. Springer, Berlin/Heidelberg, Germany.
    • (2008) Proc. Int. Conf. Computational Science and Its Applications (ICCSA'08), Part II , pp. 500-513
    • Aissani, A.1
  • 113
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair servercentric router throttles
    • Yau, D., Lui, J., Liang, F. andYam,Y. (2005) Defending against distributed denial-of-service attacks with max-min fair servercentric router throttles. IEEE/ACM Trans. Netw., 13, 29-42.
    • (2005) IEEE/ACM Trans. Netw. , vol.13 , pp. 29-42
    • Yau, D.1    Lui, J.2    Liang, F.3    Yam, Y.4
  • 114
    • 39049161433 scopus 로고    scopus 로고
    • Identification of repeated denial of service attacks
    • Barcelona, Spain, April 23-29 IEEE Communications Society, NewYork, NY, USA
    • Hussain, A., Heidemann, J. and Papadopoulos, C. (2006) Identification of Repeated Denial of Service Attacks. Proc. INFOCOM'06, Barcelona, Spain, April 23-29, pp. 1-15. IEEE Communications Society, NewYork, NY, USA.
    • (2006) Proc. INFOCOM'06 , pp. 1-15
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.