메뉴 건너뛰기




Volumn 55, Issue 5, 2011, Pages 1037-1051

WDA: A Web farm distributed denial of service attack attenuator

Author keywords

Distributed Denial Of Service; Network security

Indexed keywords

ACTIVE QUEUE MANAGEMENT; ATTACK TRAFFIC; BROWSING SOFTWARE; CLIENT-TRAFFIC; DDOS ATTACK; DDOS ATTACKERS; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; EXTENSIVE SIMULATIONS; FLOODING ATTACKS; INTERNET USERS; KEY FEATURE; NOVEL ARCHITECTURE; ORDERS OF MAGNITUDE; SERVICE DEGRADATION; WEB SERVERS;

EID: 79952454671     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2010.05.001     Document Type: Article
Times cited : (18)

References (47)
  • 3
    • 0032090155 scopus 로고    scopus 로고
    • Generating representative web workloads for network and server performance evaluation
    • P. Barford, M. Crovella, Generating representative Web workloads for network and server performance evaluation, in: SIGMETRICS, 1998, pp. 151-160. (Pubitemid 128593231)
    • (1998) Performance Evaluation Review , vol.26 , Issue.1 , pp. 151-160
    • Barford, P.1    Crovella, M.2
  • 4
    • 0004075434 scopus 로고    scopus 로고
    • ICMP Traceback Messages
    • Internet Draft draftbellovin-itrace-00.txt, March
    • S.M. Bellovin, ICMP Traceback Messages, Work in Progress, Internet Draft draftbellovin-itrace-00.txt, March 2000.
    • (2000) Work in Progress
    • Bellovin, S.M.1
  • 6
    • 79952452968 scopus 로고    scopus 로고
    • Aggressiveness Protective Fair Queueing for Bursty Applications
    • A. Bremler-Barr, N. Halachmi, H. Levi, Aggressiveness Protective Fair Queueing for Bursty Applications, in: IWQoS, 2006.
    • (2006) IWQoS
    • Bremler-Barr, A.1    Halachmi, N.2    Levi, H.3
  • 7
    • 0033356590 scopus 로고    scopus 로고
    • A behavioral model of Web traffic
    • H.-K. Choi, J.O. Limb, A behavioral model of Web traffic, in: ICNP, 1999, pp. 327-334.
    • (1999) ICNP , pp. 327-334
    • Choi, H.-K.1    Limb, J.O.2
  • 10
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and state-of-the-art
    • C. Douligeris, and A. Mitrokotsa DDoS attacks and defense mechanisms: classification and state-of-the-art Computer Networks 44 5 2004 643 666
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 15
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDOS attacks
    • J. Ioannidis, S.M. Bellovin, Implementing pushback: router-based defense against DDOS attacks, in: NDSS, 2002.
    • (2002) NDSS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 16
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and Web sites
    • J. Jung, B. Krishnamurthy, M. Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and Web sites, in: WWW, 2002, pp. 293-304.
    • (2002) WWW , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized DDOS attacks that mimic flash crowds
    • S. Kandula, D. Katabi, M. Jacob, A. Berger, Botz-4-sale: surviving organized DDOS attacks that mimic flash crowds, in: NSDI, 2005.
    • (2005) NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 19
    • 8344261545 scopus 로고    scopus 로고
    • Packetscore: Statistical-based overload control against distributed denial-of-service attacks
    • Y. Kim, W.-C. Lau, M.C. Chuah, H.J. Chao, Packetscore: statistical-based overload control against distributed denial-of-service attacks, in: INFOCOM, 2004.
    • (2004) INFOCOM
    • Kim, Y.1    Lau, W.-C.2    Chuah, M.C.3    Chao, H.J.4
  • 20
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks: The shrew vs. The mice and elephants
    • A. Kuzmanovic, E.W. Knightly, Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants, in: SIGCOMM, 2003, pp. 75-86.
    • (2003) SIGCOMM , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 21
    • 25844492549 scopus 로고    scopus 로고
    • On the effectiveness of DDoS attacks on statistical filtering
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • Q. Li, E.-C. Chang, M.C. Chan, On the effectiveness of DDOS attacks on statistical filtering, in: INFOCOM, 2005, pp. 1373-1383. (Pubitemid 41390788)
    • (2005) Proceedings - IEEE INFOCOM , vol.2 , pp. 1373-1383
    • Li, Q.1    Chang, E.-C.2    Chan, M.C.3
  • 22
    • 84939860310 scopus 로고    scopus 로고
    • On a new class of pulsing denial-of-service attacks and the defense
    • X. Luo, R.K.C. Chang. On a new class of pulsing denial-of-service attacks and the defense, in: NDSS, 2005.
    • (2005) NDSS
    • Luo, X.1    Chang, R.K.C.2
  • 24
    • 51349153757 scopus 로고    scopus 로고
    • DFence: Transparent network-based denial of service mitigation
    • Cambridge, MA, April
    • A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, Y. Zhang, dFence: transparent network-based denial of service mitigation, in: Fourth USENIX NSDI, Cambridge, MA, April 2007.
    • (2007) Fourth USENIX NSDI
    • Mahimkar, A.1    Dange, J.2    Shmatikov, V.3    Vin, H.4    Zhang, Y.5
  • 26
    • 84904888755 scopus 로고    scopus 로고
    • Attacking DDOS at the Source
    • J. Mirkovic, G. Prier, P.L. Reiher, Attacking DDOS at the Source, in: ICNP, 2002, pp. 312-321.
    • (2002) ICNP , pp. 312-321
    • Mirkovic, J.1    Prier, G.2    Reiher, P.L.3
  • 27
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • J. Mirkovic, and P.L. Reiher A taxonomy of DDoS attack and DDoS defense mechanisms Computer Communication Review 34 2 2004 39 53
    • (2004) Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.L.2
  • 29
    • 0027612043 scopus 로고
    • A generalized processor sharing approach to flow control in integrated services networks: The single-node case
    • A.K. Parekh, and R.G. Gallager A generalized processor sharing approach to flow control in integrated services networks: the single-node case IEEE/ACM Transactions on Networking 1 3 1993 344 357
    • (1993) IEEE/ACM Transactions on Networking , vol.1 , Issue.3 , pp. 344-357
    • Parekh, A.K.1    Gallager, R.G.2
  • 31
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-resilient scheduling to counter application layer attacks under imperfect detection
    • S. Ranjan, R. Swaminathan, M. Uysal, E.W. Knightly, DDoS-resilient scheduling to counter application layer attacks under imperfect detection, in: INFOCOM, 2006.
    • (2006) INFOCOM
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.W.4
  • 35
    • 18844457631 scopus 로고    scopus 로고
    • WebSOS: An overlay-based system for protecting web servers from denial of service attacks
    • DOI 10.1016/j.comnet.2005.01.005, PII S1389128605000137, Web Traffic
    • A. Stavrou, D.L. Cook, W.G. Morein, A.D. Keromytis, V. Misra, and D. Rubenstein WebSOS: an overlay-based system for protecting Web servers from denial of service attacks Computer Networks 48 5 2005 781 807 (Pubitemid 40684162)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 781-807
    • Stavrou, A.1    Cook, D.L.2    Morein, W.G.3    Keromytis, A.D.4    Misra, V.5    Rubenstein, D.6
  • 38
    • 34250620174 scopus 로고    scopus 로고
    • NetBouncer: Client-legitimacy-based high-performance DDOS filtering
    • R. Thomas, B. Mark, T. Johnson, J. Croall, NetBouncer: client-legitimacy-based high-performance DDOS filtering, in: DISCEX, 2003, pp. 14-25.
    • (2003) DISCEX , pp. 14-25
    • Thomas, R.1    Mark, B.2    Johnson, T.3    Croall, J.4
  • 41
    • 0142039747 scopus 로고    scopus 로고
    • Transport-aware IP routers: A built-in protection mechanism to counter DDOS attacks
    • H. Wang, and K.G. Shin Transport-aware IP routers: a built-in protection mechanism to counter DDOS attacks IEEE Transactions on Parallel and Distributed Systems 14 9 2003 873 884
    • (2003) IEEE Transactions on Parallel and Distributed Systems , vol.14 , Issue.9 , pp. 873-884
    • Wang, H.1    Shin, K.G.2
  • 42
    • 14844334596 scopus 로고    scopus 로고
    • Mitigating bandwidth-exhaustion attacks using congestion puzzles
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • X. Wang, M.K. Reiter, Mitigating bandwidth-exhaustion attacks using congestion puzzles, in: ACM Conference on Computer and Communications Security, 2004, pp. 257-267. (Pubitemid 40338207)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 257-267
    • Wang, X.1    Reiter, M.K.2
  • 45
  • 46
    • 25844461391 scopus 로고    scopus 로고
    • FIT: Fast Internet traceback
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • A. Yaar, A. Perrig, D.X. Song, FIT: fast Internet traceback, in: INFOCOM, 2005, pp. 1395-1406. (Pubitemid 41390790)
    • (2005) Proceedings - IEEE INFOCOM , vol.2 , pp. 1395-1406
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.