메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1278-1286

QoSoDoS: If you can't beat them, join them!

Author keywords

[No Author keywords available]

Indexed keywords

BEST-EFFORT; DOS ATTACKS; EMPIRICAL RESULTS; MULTIPLE TRANSMISSION; UNRELIABLE NETWORK;

EID: 79960856009     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934910     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 1
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • J. Mirkovic and P. L. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms, " Computer Communication Review, vol. 34, no. 2, pp. 39-53, 2004.
    • (2004) Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.L.2
  • 2
    • 0037956023 scopus 로고    scopus 로고
    • New terminology and clarifications for diffserv
    • Apr. [Online]
    • D. Grossman, "New Terminology and Clarifications for Diffserv, " RFC 3260 (Informational), Internet Engineering Task Force, Apr. 2002. [Online]. Available: http://www.ietf.orglrfc/rfc3260.txt
    • (2002) RFC 3260 (Informational)
    • Grossman, D.1
  • 3
    • 77950302383 scopus 로고    scopus 로고
    • Multi protocol label switching architecture
    • Jan. [Online]
    • E. Rosen, A. Viswanathan, and R. Calion, "Multi protocol Label Switching Architecture, " RFC 3031 (Proposed Standard), Internet Engineering Task Force, Jan. 2001. [Online]. Available: http://www.ietf.orglrfc/ rfc3031.txt
    • (2001) RFC 3031 (Proposed Standard)
    • Rosen, E.1    Viswanathan, A.2    Calion, R.3
  • 4
    • 0003260781 scopus 로고
    • Transmission control protocol
    • Sep. [Online] updated by RFCs 1122, 3168
    • J. Postel, "Transmission Control Protocol, " RFC 793 (Standard), Internet Engineering Task Force, Sep. 1981, updated by RFCs 1122, 3168. [Online]. Available: http://www.ietf.orglrfc/rfc793.txt
    • (1981) RFC 793 (Standard)
    • Postel, J.1
  • 5
    • 0004021859 scopus 로고    scopus 로고
    • Network calculus: A Theory of deterministic queuing systems for the internet, ser
    • Springer
    • J.-Y. L. Boudec and P. Thiran, Network Calculus: A Theory of Deterministic Queuing Systems for the Internet, ser. Lecture Notes in Computer Science. Springer, 2001, vol. 2050.
    • (2001) Lecture Notes in Computer Science , vol.2050
    • Boudec, J.-Y.L.1    Thiran, P.2
  • 6
    • 79960888325 scopus 로고    scopus 로고
    • TCP congestion control
    • Sep. [Online]
    • M. Allman, V. Paxson, and E. Blanton, "TCP Congestion Control, " RFC 5681 (Draft Standard), Internet Engineering Task Force, Sep. 2009. [Online]. Available: http://www.ietf.orglrfc/rfc5681.txt
    • (2009) RFC 5681 (Draft Standard)
    • Allman, M.1    Paxson, V.2    Blanton, E.3
  • 7
    • 0013091507 scopus 로고    scopus 로고
    • Datagram congestion control protocol (DCCP)
    • Mar. , updated by RFCs 5595, 5596 . [Online]
    • E. Kohler, M. Handley, and S. Floyd, "Datagram Congestion Control Protocol (DCCP), " RFC 4340 (Proposed Standard), Internet Engineering Task Force, Mar. 2006, updated by RFCs 5595, 5596. [Online]. Available: http://www.ietf.orglrfc/rfc4340.txt
    • (2006) RFC 4340 (Proposed Standard)
    • Kohler, E.1    Handley, M.2    Floyd, S.3
  • 8
    • 70449606648 scopus 로고    scopus 로고
    • Cubic: A new tcp-friendly highspeed tcp variant
    • July
    • H. Sangtae, R. Injong, and X. Lisong, "Cubic: a new tcp-friendly highspeed tcp variant, " SIGOP S Oper. Syst. Rev., vol. 42, pp. 64-74, July 2008.
    • (2008) SIGOP S Oper. Syst. Rev. , vol.42 , pp. 64-74
    • Sangtae, H.1    Injong, R.2    Lisong, X.3
  • 9
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks and counter strategies
    • A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies, " IEEE/ACM Trans. Netw, vol. 14, no. 4, pp. 683-696, 2006.
    • (2006) IEEE/ACM Trans. Netw , vol.14 , Issue.4 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 11
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • May, updated by RFC 3704. [Online]
    • P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, " RFC 2827 (Best Current Practice), Internet Engineering Task Force, May 2000, updated by RFC 3704. [Online]. Available: http://www.ietf.orglrfc/rfc2827.txt
    • (2000) RFC 2827 (Best Current Practice)
    • Ferguson, P.1    Senie, D.2
  • 12
    • 70350365519 scopus 로고    scopus 로고
    • Lightweight opportunistic tunneling (LOT)
    • Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. P roceedings, ser., M. Backes and P. Ning, Eds., Springer
    • Y. Gilad and A. Herzberg, "Lightweight opportunistic tunneling (LOT), " in Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. P roceedings, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 104-119.
    • (2009) Lecture Notes in Computer Science , vol.5789 , pp. 104-119
    • Gilad, Y.1    Herzberg, A.2
  • 13
    • 85180745018 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • The Internet Society
    • J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks, " in NDSS. The Internet Society, 2002.
    • (2002) NDSS
    • Ioannidis, J.1    Bellovin, S.M.2
  • 18
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
    • IEEE Computer Society
    • A. Yaar, A. Perrig, and D. X. Song, "SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, " in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004, p. 130.
    • (2004) IEEE Symposium on Security and Privacy , pp. 130
    • Yaar, A.1    Perrig, A.2    Song, D.X.3
  • 21
    • 85094665335 scopus 로고    scopus 로고
    • Phalanx: Withstanding multimillion-node botnets
    • April 16-18, San Francisco, CA, USA, P roceedings, J. Crowcroft and M. Dahlin, Eds. USENIX Association, 2008
    • C. Dixon, T. E. Anderson, and A. Krishnamurthy, "Phalanx: Withstanding multimillion-node botnets, " in 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008, April 16-18, 2008, San Francisco, CA, USA, P roceedings, J. Crowcroft and M. Dahlin, Eds. USENIX Association, 2008, pp. 45-58.
    • (2008) 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008 , pp. 45-58
    • Dixon, C.1    Anderson, T.E.2    Krishnamurthy, A.3
  • 22
    • 27644518127 scopus 로고    scopus 로고
    • D-ward: A source-end defense against flooding denial-of-service attacks
    • J. Mirkovic and P. L. Reiher, "D-ward: A source-end defense against flooding denial-of-service attacks, " IEEE Trans. Dependable Sec. Comput., vol. 2, no. 3, pp. 216-232, 2005.
    • (2005) IEEE Trans. Dependable Sec. Comput. , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.L.2
  • 23
    • 72449130431 scopus 로고    scopus 로고
    • Proactive surge protection: A defense mechanism for bandwidth-based attacks
    • Dec.
    • J. C.-Y. Chou, B. Lin, S. Sen, and O. Spatscheck, "Proactive surge protection: a defense mechanism for bandwidth-based attacks, " IEEE/ ACM Transactions on Networking, vol. 17, no. 6, pp. 1711-1723, Dec. 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.6 , pp. 1711-1723
    • Chou, J.C.-Y.1    Lin, B.2    Sen, S.3    Spatscheck, O.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.