메뉴 건너뛰기




Volumn 227 CCIS, Issue PART 4, 2011, Pages 388-396

An OTP-based mechanism for defending application layer DDoS attacks

Author keywords

Application Layer; DDos Attacks; OTP; Puzzle; Web Service

Indexed keywords

APPLICATION LAYERS; AUTHENTICATION MECHANISMS; BRUTE-FORCE ATTACK; CLIENT SOFTWARE; DDOS ATTACK; GRAPHICAL TEST; INTERMEDIATE STAGE; IP ADDRESSS; LEGITIMATE USERS; OTP; PUZZLE; REPLAY ATTACK; TIME INTERVAL; WEB SERVERS;

EID: 80052373792     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-23226-8_51     Document Type: Conference Paper
Times cited : (1)

References (12)
  • 1
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
    • Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E.: DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection. In: INFOCOM 2006 (2006)
    • (2006) INFOCOM 2006
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 3
    • 47149094655 scopus 로고    scopus 로고
    • A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
    • Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
    • (2007) Proceedings of ICNS 2007
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 4
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
    • Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Transactions on the Web (2008)
    • (2008) ACM Transactions on the Web
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 5
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the Application-Layer DDoS Attacks for Popular Websites
    • Xie, Y., Yu, S.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Transactions on Networking (2009)
    • (2009) IEEE/ACM Transactions on Networking
    • Xie, Y.1    Yu, S.2
  • 6
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Xie, Y., Yu, S.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (2009)
    • (2009) IEEE/ACM Transactions on Networking
    • Xie, Y.1    Yu, S.2
  • 8
    • 0041431049 scopus 로고    scopus 로고
    • Recognising objects in adversarial clutter: Breaking a visual CAPTCHA
    • IEEE Computer Society, Los Alamitos
    • Mori, G., Malik, J.: Recognising objects in adversarial clutter: breaking a visual CAPTCHA. In: IEEE Conference on Computer Vision & Pattern Recognition (CVPR), June 18-20, vol. 1, pp. I-134-I-141. IEEE Computer Society, Los Alamitos (2003)
    • (2003) IEEE Conference on Computer Vision & Pattern Recognition (CVPR), June 18-20 , vol.1
    • Mori, G.1    Malik, J.2
  • 9
    • 47149094655 scopus 로고    scopus 로고
    • A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
    • Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
    • (2007) Proceedings of ICNS 2007
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 11
    • 8344272005 scopus 로고    scopus 로고
    • Stochastic models for generating synthetic http source traffic
    • March
    • Cao, J., Cleveland, W., Gao, Y., Jeffay, K., Smith, F., Weigle, M.: Stochastic models for generating synthetic http source traffic. In: IEEE Infocom 2004, vol. 3, pp. 1546-1557 (March 2004)
    • (2004) IEEE Infocom 2004 , vol.3 , pp. 1546-1557
    • Cao, J.1    Cleveland, W.2    Gao, Y.3    Jeffay, K.4    Smith, F.5    Weigle, M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.