메뉴 건너뛰기




Volumn 18 LNICST, Issue , 2009, Pages 175-191

A lightweight mechanism to mitigate application layer DDoS attacks

Author keywords

Application layer; DDoS attacks; Lightweight; Trust

Indexed keywords

APPLICATION LAYERS; DDOS ATTACK; FLOODING ATTACKS; JAVA PACKAGES; LEGITIMATE USERS; LIGHTWEIGHT; REPLAY ATTACK; TRUST; TRUST MANAGEMENT; USER IDENTIFICATION;

EID: 84868307433     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-10485-5_13     Document Type: Conference Paper
Times cited : (24)

References (25)
  • 7
    • 25844492549 scopus 로고    scopus 로고
    • On the effectiveness of DDoS attacks on statistical filtering
    • Li, Q., Chang, E., Chan, M.: On the Effectiveness of DDoS Attacks on Statistical Filtering. In: Proceedings of INFOCOM 2005 (2005)
    • (2005) Proceedings of INFOCOM 2005
    • Li, Q.1    Chang, E.2    Chan, M.3
  • 9
    • 78049513091 scopus 로고    scopus 로고
    • Analysis of a general probabilistic packet marking model for IP traceback
    • Lu, L., Chan, M., Chang, E.: Analysis of a General Probabilistic Packet Marking Model for IP traceback. In: Proceedings of ASIACCS 2008 (2008)
    • (2008) Proceedings of ASIACCS 2008
    • Lu, L.1    Chan, M.2    Chang, E.3
  • 14
    • 77954321139 scopus 로고    scopus 로고
    • Fine-grained capabilities for flooding DDoS defense using client reputations
    • Natu, M., Mirkovic, J.: Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations. In: Proceedings of LSAD 2007 (2007)
    • (2007) Proceedings of LSAD 2007
    • Natu, M.1    Mirkovic, J.2
  • 15
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-resilient scheduling to counter application layer attacks under imperfect detection
    • Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E.: DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection. In: Proceedings of INFOCOM 2006 (2006)
    • (2006) Proceedings of INFOCOM 2006
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 16
    • 33646831908 scopus 로고    scopus 로고
    • TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks. In: Proceedings of WWW 2005 (2005)
    • (2005) Proceedings of WWW 2005
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 17
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on web servers: A client-transparent approach
    • Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Transactions on the Web (2008)
    • (2008) ACM Transactions on the Web
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 22
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Xie, Y., Yu, S.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Transactions on Networking (2009)
    • (2009) IEEE/ACM Transactions on Networking
    • Xie, Y.1    Yu, S.2
  • 23
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Xie, Y., Yu, S.: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (2009)
    • (2009) IEEE/ACM Transactions on Networking
    • Xie, Y.1    Yu, S.2
  • 24
    • 47149094655 scopus 로고    scopus 로고
    • A detection and offense mechanism to defend against application layer DDoS attacks
    • Yu, J., Li, Z., Chen, H., Chen, X.: A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. In: Proceedings of ICNS 2007 (2007)
    • (2007) Proceedings of ICNS 2007
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 25
    • 60649116060 scopus 로고    scopus 로고
    • Misusing kademlia protocol to perform DDoS attacks
    • Yu, J., Li, Z., Chen, X.: Misusing Kademlia protocol to perform DDoS attacks. In: Proceedings of ISPA 2008 (2008)
    • (2008) Proceedings of ISPA 2008
    • Yu, J.1    Li, Z.2    Chen, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.