메뉴 건너뛰기




Volumn , Issue , 2011, Pages 520-527

CluB: A cluster based framework for mitigating distributed denial of service attacks

Author keywords

cluster based; distributed denial of service; granularity of control

Indexed keywords

CLUSTER-BASED; CONTROL ASPECTS; DATAGRAMS; DDOS ATTACK; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; GRANULARITY OF CONTROL; ROUTING POLICIES;

EID: 79959316635     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1982185.1982297     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 2
    • 18144411533 scopus 로고    scopus 로고
    • Preventing internet denial-of-service with capabilities
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-of-service with capabilities. SIGCOMM Comput. Commun. Rev., 34(1):39-44, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.1 , pp. 39-44
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 5
    • 0142061214 scopus 로고    scopus 로고
    • Rate adaptation, congestion control and fairness: A tutorial
    • December
    • J.-Y. L. Boudec. Rate adaptation, congestion control and fairness: A tutorial, EPFL, December 2000.
    • (2000) EPFL
    • Boudec, J.-Y.L.1
  • 6
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • Y. Chen, K. Hwang, and W.-S. Ku. Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst., 18(12):1649-1662, 2007.
    • (2007) IEEE Trans. Parallel Distrib. Syst. , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 7
    • 0242466860 scopus 로고    scopus 로고
    • The average distances in random graphs with given expected degrees
    • F. Chung and L. Lu. The average distances in random graphs with given expected degrees. Internet Mathematics, 1:15879-15882, 2002.
    • (2002) Internet Mathematics , vol.1 , pp. 15879-15882
    • Chung, F.1    Lu, L.2
  • 8
    • 0024665231 scopus 로고
    • Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications
    • May
    • D. Estrin, J. Mogul, and G. Tsudik. Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications, IEEE Journal on, 7(4):486-498, May 1989.
    • (1989) IEEE Journal on , vol.7 , Issue.4 , pp. 486-498
    • Estrin, D.1    Mogul, J.2    Tsudik, G.3
  • 9
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the internet topology
    • ACM
    • M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In SIGCOMM '99, pages 251-262. ACM, 1999.
    • (1999) SIGCOMM '99 , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 10
    • 58149092182 scopus 로고    scopus 로고
    • Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts
    • IEEE Computer Society
    • Z. Fu, M. Papatriantafilou, and P. Tsigas. Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts. In Proceedings of IEEE SRDS, pages 63-72. IEEE Computer Society, 2008.
    • (2008) Proceedings of IEEE SRDS , pp. 63-72
    • Fu, Z.1    Papatriantafilou, M.2    Tsigas, P.3
  • 12
    • 77954694546 scopus 로고    scopus 로고
    • Mitigating denial of capability attacks using sink tree based quota allocation
    • ACM
    • Z. Fu, M. Papatriantafilou, P. Tsigas, and W. Wei. Mitigating denial of capability attacks using sink tree based quota allocation. In Proceedings of SAC 2010, pages 713-718. ACM, 2010.
    • (2010) Proceedings of SAC 2010 , pp. 713-718
    • Fu, Z.1    Papatriantafilou, M.2    Tsigas, P.3    Wei, W.4
  • 13
    • 21844463097 scopus 로고    scopus 로고
    • Spv: Secure path vector routing for securing bgp
    • ACM
    • Y.-C. Hu, A. Perrig, and M. Sirbu. Spv: secure path vector routing for securing bgp. In SIGCOMM '04, pages 179-192. ACM, 2004.
    • (2004) SIGCOMM '04 , pp. 179-192
    • Hu, Y.-C.1    Perrig, A.2    Sirbu, M.3
  • 15
    • 65249149520 scopus 로고    scopus 로고
    • To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
    • ACM
    • X. Liu, X. Yang, and Y. Lu. To filter or to authorize: network-layer DoS defense against multimillion-node botnets. In SIGCOMM '08, pages 195-206. ACM, 2008.
    • (2008) SIGCOMM '08 , pp. 195-206
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 17
    • 33644905483 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. B. I. M. Mitzenmacher. Network applications of bloom filters: A survey. In Internet Mathematics, pages 636-646, 2002.
    • (2002) Internet Mathematics , pp. 636-646
    • Mitzenmacher, A.B.I.M.1
  • 18
    • 36949036429 scopus 로고    scopus 로고
    • Portcullis: Protecting connection setup from denial-of-capability attacks
    • ACM
    • B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: protecting connection setup from denial-of-capability attacks. In SIGCOMM '07, pages 289-300. ACM, 2007.
    • (2007) SIGCOMM '07 , pp. 289-300
    • Parno, B.1    Wendlandt, D.2    Shi, E.3    Perrig, A.4    Maggs, B.5    Hu, Y.-C.6
  • 19
    • 21844450913 scopus 로고    scopus 로고
    • A system for authenticated policy-compliant routing
    • B. Raghavan and A. C. Snoeren. A system for authenticated policy-compliant routing. SIGCOMM Comput. Commun. Rev., 34(4):167-178, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.4 , pp. 167-178
    • Raghavan, B.1    Snoeren, A.C.2
  • 21
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip traceback
    • vol.2
    • D. X. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In IEEE INFOCOM 2001., volume 2, pages 878-886 vol.2, 2001.
    • (2001) IEEE INFOCOM 2001 , vol.2 , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 22
    • 33745781163 scopus 로고    scopus 로고
    • Countering dos attacks with stateless multipath overlays
    • New York, NY, USA, ACM
    • A. Stavrou and A. D. Keromytis. Countering dos attacks with stateless multipath overlays. In Proceedings of ACM CCS, pages 249-259, New York, NY, USA, 2005. ACM.
    • (2005) Proceedings of ACM CCS , pp. 249-259
    • Stavrou, A.1    Keromytis, A.D.2
  • 23
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS ooding attacks
    • A. Yaar, A. Perrig, and D. Song. SIFF: A stateless internet flow filter to mitigate DDoS ooding attacks. IEEE Security and Privacy Symposium, page 130, 2004.
    • (2004) IEEE Security and Privacy Symposium , pp. 130
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 24
    • 33750308365 scopus 로고    scopus 로고
    • A DoS-limiting network architecture
    • ACM
    • X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting network architecture. In SIGCOMM '05, pages 241-252. ACM, 2005.
    • (2005) SIGCOMM '05 , pp. 241-252
    • Yang, X.1    Wetherall, D.2    Anderson, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.