메뉴 건너뛰기




Volumn 4, Issue 16, 2010, Pages 1952-1962

Mitigating application layer distributed denial of service attacks via effective trust management

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION LAYERS; BANDWIDTH OVERHEADS; COMPUTATION COSTS; DDOS ATTACK; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLOODING ATTACKS; JAVA PACKAGES; LEGITIMATE USERS; REPLAY ATTACK; SIMULATION RESULT; TRUST MANAGEMENT; USER IDENTIFICATION; WEB SERVERS;

EID: 78149435896     PISSN: 17518628     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-com.2009.0809     Document Type: Article
Times cited : (37)

References (30)
  • 1
    • 29244475815 scopus 로고    scopus 로고
    • Internet denial of service: attack and defense mechanisms
    • Prentice-Hall PTR
    • Mirkovic, J. Dietrich, S. Dittrich, D. Reiher, P.: 'Internet denial of service: attack and defense mechanisms', (Prentice-Hall PTR 2004)
    • (2004)
    • Mirkovic, J.1    Dietrich, S.2    Dittrich, D.3    Reiher, P.4
  • 2
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-resilient scheduling to counter application layer attacks under imperfect detection
    • Ranjan, S. Swaminathan, R. Uysal, M. Knightly, E.: 'DDoS-resilient scheduling to counter application layer attacks under imperfect detection', Proc. INFOCOM'06, 2006
    • (2006) Proc. INFOCOM'06
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 3
    • 47149094655 scopus 로고    scopus 로고
    • A Detection and offense mechanism to defend against application layer DDoS attacks
    • Yu, J. Li, Z. Chen, H. Chen, X.: 'A Detection and offense mechanism to defend against application layer DDoS attacks', Proc. ICNS'07, 2007
    • (2007) Proc. ICNS'07
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 4
    • 25844492549 scopus 로고    scopus 로고
    • On the effectiveness of DDoS attacks on statistical filtering
    • Li, Q. Chang, E. Chan, M.: 'On the effectiveness of DDoS attacks on statistical filtering', Proc. INFOCOM'05, 2005
    • (2005) Proc. INFOCOM'05
    • Li, Q.1    Chang, E.2    Chan, M.3
  • 6
    • 70450210296 scopus 로고    scopus 로고
    • Effective metric for detecting distributed denial-of-service attacks based on information divergence
    • Li, K. Zhou, W. Yu, S.: 'Effective metric for detecting distributed denial-of-service attacks based on information divergence', IET Commun., 2009, 3, (12), p. 1851-1860
    • (2009) IET Commun. , vol.3 , Issue.12 , pp. 1851-1860
    • Li, K.1    Zhou, W.2    Yu, S.3
  • 8
    • 24344471722 scopus 로고    scopus 로고
    • A practical method to counteract denial of service attacks
    • Tupakula, U. Varadharajan, V.: 'A practical method to counteract denial of service attacks', Proc. ACSC'03, 2003
    • (2003) Proc. ACSC'03
    • Tupakula, U.1    Varadharajan, V.2
  • 9
    • 78049513091 scopus 로고    scopus 로고
    • Analysis of a general probabilistic packet marking model for IP traceback
    • Lu, L. Chan, M. Chang, E.: 'Analysis of a general probabilistic packet marking model for IP traceback', Proc. ASIACCS'08, 2008
    • (2008) Proc. ASIACCS'08
    • Lu, L.1    Chan, M.2    Chang, E.3
  • 10
    • 0041817284 scopus 로고    scopus 로고
    • CenterTrack: an IP overlay network for tracking DoS floods
    • Stone, R.: 'CenterTrack: an IP overlay network for tracking DoS floods', Proc. Ninth Usenix Sec. Symp., 2002
    • (2002) Proc. Ninth Usenix Sec. Symp.
    • Stone, R.1
  • 11
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • 1045-9219
    • Chen, Y. Hwang, K. Ku, W.: 'Collaborative detection of DDoS attacks over multiple network domains', IEEE Trans. Parallel Distrib. Syst., 2007, 2, (3), p. 1-49, 1045-9219
    • (2007) IEEE Trans. Parallel Distrib. Syst. , vol.2 , Issue.3 , pp. 1-49
    • Chen, Y.1    Hwang, K.2    Ku, W.3
  • 12
    • 3142512777 scopus 로고    scopus 로고
    • Detecting DDOS attack based on network self-similarity
    • 1350-2425
    • Xiang, Y. Lin, Y. Lei, W.L. Huang, S.J.: 'Detecting DDOS attack based on network self-similarity', IEE Proc. Commun., 2004, 151, (3), p. 292-295, 1350-2425
    • (2004) IEE Proc. Commun. , vol.151 , Issue.3 , pp. 292-295
    • Xiang, Y.1    Lin, Y.2    Lei, W.L.3    Huang, S.J.4
  • 13
    • 34547421426 scopus 로고    scopus 로고
    • The index poisoning attack in P2P file sharing systems
    • Liang, J. Naoumov, N. Ross, K.W.: 'The index poisoning attack in P2P file sharing systems', Proc. INFOCOM'06, 2006
    • (2006) Proc. INFOCOM'06
    • Liang, J.1    Naoumov, N.2    Ross, K.W.3
  • 14
    • 60649112960 scopus 로고    scopus 로고
    • Misusing unstructured P2P systems to perform DoS attacks: the network that never forgets
    • Athanasopoulos, E. Anagnostakis, K. Markatos, E.: 'Misusing unstructured P2P systems to perform DoS attacks: the network that never forgets', Proc. ACNS'06, 2006
    • (2006) Proc. ACNS'06
    • Athanasopoulos, E.1    Anagnostakis, K.2    Markatos, E.3
  • 15
  • 16
    • 60649116060 scopus 로고    scopus 로고
    • Misusing Kademlia protocol to perform DDoS attacks
    • Yu, J. Li, Z. Chen, X.: 'Misusing Kademlia protocol to perform DDoS attacks', Proc. ISPA'08, 2008
    • (2008) Proc. ISPA'08
    • Yu, J.1    Li, Z.2    Chen, X.3
  • 19
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on web servers: a client-transparent approach
    • Srivatsa, M. Iyengar, A. Yin, J. Liu, L.: 'Mitigating application-level denial of service attacks on web servers: a client-transparent approach', ACM Trans. Web, 2008, 18, (12), p. 1649-1662
    • (2008) ACM Trans. Web , vol.18 , Issue.12 , pp. 1649-1662
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 20
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • 1063-6692
    • Xie, Y. Yu, S.: 'Monitoring the application-layer DDoS attacks for popular websites', IEEE/ACM Trans. Netw., 2009, 17, (1), p. 15-25, 1063-6692
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.2
  • 21
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • 1063-6692
    • Xie, Y. Yu, S.: 'A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors', IEEE/ACM Trans. Netw., 2009, 17, (1), p. 54-65, 1063-6692
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.2
  • 24
    • 33646831908 scopus 로고    scopus 로고
    • TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
    • Srivatsa, M. Xiong, L. Liu, L.: 'TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks', Proc. WWW'05, 2005
    • (2005) Proc. WWW'05
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 26
    • 85127665852 scopus 로고    scopus 로고
    • Web server workload characterization: the search for invariants
    • Arlitt, M. Williamson, C.: 'Web server workload characterization: the search for invariants', Proc. ACM SIGMETRICS'96, 1996
    • (1996) Proc. ACM SIGMETRICS'96
    • Arlitt, M.1    Williamson, C.2
  • 27
    • 77954321139 scopus 로고    scopus 로고
    • Fine-grained capabilities for flooding DDoS defense using client reputations
    • Natu, M. Mirkovic, J.: 'Fine-grained capabilities for flooding DDoS defense using client reputations', Proc. LSAD'07, 2007
    • (2007) Proc. LSAD'07
    • Natu, M.1    Mirkovic, J.2
  • 30
    • 78149456339 scopus 로고    scopus 로고
    • A lightweight mechanism to mitigate application layer DDoS attacks
    • Yu, J. Fang, C. Lu, L. Li, Z.: 'A lightweight mechanism to mitigate application layer DDoS attacks', Proc. Infoscale'09, 2009
    • (2009) Proc. Infoscale'09
    • Yu, J.1    Fang, C.2    Lu, L.3    Li, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.