메뉴 건너뛰기




Volumn 3, Issue , 2012, Pages 454-468

Denial of Service Attacks

Author keywords

DDoS defenses; Denial of service attacks; DoS attacks; Internet; Taxonomy of DoS DDoS attacks

Indexed keywords


EID: 84886218857     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9781118256107.ch29     Document Type: Chapter
Times cited : (33)

References (74)
  • 1
    • 11244252132 scopus 로고    scopus 로고
    • Denial of service resilience in ad hoc networks
    • In Proceedings of ACM Mobicom. New York: ACM Press
    • Aad, I., J. P. Hubaux, and E. Knightly. 2004. Denial of service resilience in ad hoc networks. In Proceedings of ACM Mobicom. New York: ACM Press.
    • (2004)
    • Aad, I.1    Hubaux, J.P.2    Knightly, E.3
  • 2
    • 0037224225 scopus 로고    scopus 로고
    • IP traceback using header compression
    • Aljifri, H., M. Smets, and A. Pons. 2003. IP traceback using header compression. Computers & Security, 22 (2): 136-51.
    • (2003) Computers & Security , vol.22 , Issue.2 , pp. 136-151
    • Aljifri, H.1    Smets, M.2    Pons, A.3
  • 3
    • 35048820228 scopus 로고    scopus 로고
    • Mayday: Distributed filtering for Internet services
    • In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems. Berkeley, CA: USENIX Press
    • Andersen, D. G. 2003. Mayday: Distributed filtering for Internet services. In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems. Berkeley, CA: USENIX Press.
    • (2003)
    • Andersen, D.G.1
  • 4
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial of service with capabilities
    • In Proceedings of HotNets-II. New York: ACM Press
    • Anderson, T., T. Roscoe, and D. Wetherall. 2003. Preventing Internet denial of service with capabilities. In Proceedings of HotNets-II. New York: ACM Press.
    • (2003)
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 5
    • 85050149881 scopus 로고    scopus 로고
    • Active Internet traffic filtering: Real-time response to denial-of-service attacks
    • In Proceedings of the USENIX Annual Technical Conference. Berkeley, CA: USENIX Press
    • Argyraki, K., and D. R. Cheriton. 2005. Active Internet traffic filtering: Real-time response to denial-of-service attacks. In Proceedings of the USENIX Annual Technical Conference. Berkeley, CA: USENIX Press.
    • (2005)
    • Argyraki, K.1    Cheriton, D.R.2
  • 7
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: real vulnerabilities and practical solutions
    • In Proceedings of USENIX Security Symposium, 15-28. Berkeley, CA: USENIX Press
    • Bellardo, J., and S. Savage. 2003. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of USENIX Security Symposium, 15-28. Berkeley, CA: USENIX Press.
    • (2003)
    • Bellardo, J.1    Savage, S.2
  • 8
    • 14944374775 scopus 로고    scopus 로고
    • SYN cookies
    • accessed October 31, 2006
    • Bernstein, D. J. 1996. SYN cookies. http://cr.yp.to/syncookies.html (accessed October 31, 2006).
    • (1996)
    • Bernstein, D.J.1
  • 9
    • 30344478446 scopus 로고    scopus 로고
    • Bro Intrusion Detection System
    • Bro, accessed October 31, 2006
    • Bro. 2006. Bro Intrusion Detection System. http://bro-ids.org/(accessed October 31, 2006).
    • (2006)
  • 10
    • 84886181976 scopus 로고    scopus 로고
    • CERT, CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks, accessed January 2, 2006
    • CERT. 1996. CERT Advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. www.cert.org/advisories/CA-1996-21.html (accessed January 2, 2006).
    • (1996)
  • 11
    • 14844283358 scopus 로고    scopus 로고
    • CERT Advisory CA-1997-28 IP Denial-of-Service Attacks
    • CERT, accessed August 20, 2006
    • CERT. 1997. CERT Advisory CA-1997-28 IP Denial-of-Service Attacks. www.cert.org/advisories/CA-1997-28.html (accessed August 20, 2006).
    • (1997)
  • 12
    • 0009985757 scopus 로고    scopus 로고
    • CERT Advisory CA-1998-01 Smurf IP denial-of-service attacks
    • CERT, accessed January 2, 2006
    • CERT. 1998. CERT Advisory CA-1998-01 Smurf IP denial-of-service attacks. www.cert.org/advisories/CA-1998-01.html (accessed January 2, 2006).
    • (1998)
  • 13
    • 84886125233 scopus 로고    scopus 로고
    • Technical Cyber Security Alert TA04-028A
    • CERT, W32/MyDoom.B virus, accessed January 2, 2006
    • CERT. 2004. Technical Cyber Security Alert TA04-028A, W32/MyDoom.B virus. www.us-cert.gov/cas/techalerts/TA04-028A.html (accessed January 2, 2006).
    • (2004)
  • 14
    • 24944574614 scopus 로고    scopus 로고
    • CERT/CC Statistics 1988-2005
    • CERT, accessed January 2, 2006
    • CERT. 2006. CERT/CC Statistics 1988-2005. www.cert.org/stats/#incidents (accessed January 2, 2006).
    • (2006)
  • 15
    • 85084160220 scopus 로고    scopus 로고
    • Mapping and visualizing the internet
    • In Proceedings of USENIX Annual Technical Conference. Berkeley, CA: USENIX Press
    • Cheswick, B., H. Burch, and S. Branigan. 2000. Mapping and visualizing the internet. In Proceedings of USENIX Annual Technical Conference. Berkeley, CA: USENIX Press.
    • (2000)
    • Cheswick, B.1    Burch, H.2    Branigan, S.3
  • 16
    • 0011309001 scopus 로고    scopus 로고
    • Dealing with malloc fail and high CPU utilization resulting from the code red worm
    • CISCO, accessed April 15, 2006
    • CISCO. 2001. Dealing with malloc fail and high CPU utilization resulting from the code red worm. www.cisco. com/warp/public/63/ts_codred_worm.shtml (accessed April 15, 2006).
    • (2001)
  • 17
    • 56449096542 scopus 로고    scopus 로고
    • CISCO IOS NetFlow
    • CISCO, accessed August 20, 2006
    • CISCO. (2006). CISCO IOS NetFlow. www.cisco.com/en/US/products/ps6601/products_ios_protocol_group_ home.html (accessed August 20, 2006).
    • (2006)
  • 18
    • 84886121860 scopus 로고    scopus 로고
    • CISCO PIX 500 Series Security Appliances
    • CISCO, accessed August 20, 2006
    • CISCO. (2006). CISCO PIX 500 Series Security Appliances . www.cisco.com/en/US/products/hw/vpndevc/ps2030/index.html (accessed August 20, 2006)
    • (2006)
  • 19
    • 84886184314 scopus 로고    scopus 로고
    • Cisco Guard DDoS Mitigation Appliances
    • CISCO, accessed August 20, 2006
    • CISCO. (2006). Cisco Guard DDoS Mitigation Appliances . www.cisco.com/en/US/products/ps5888/index. html (accessed August 20, 2006).
    • (2006)
  • 20
    • 85009448253 scopus 로고    scopus 로고
    • PointGuard: Protecting pointers from buffer overflow vulnerabilities
    • In Proceedings of the 12th USENIX Security Symposium. Berkeley, CA: USENIX Press
    • Cowan, C., S. Beattie, J. Johansen, and P. Wagle. 2003. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium. Berkeley, CA: USENIX Press
    • (2003)
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 21
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • In Proceedings of the 12th USENIX Security Symposium, 29-44. Berkeley, CA: USENIX Press
    • Crosby, S. A., and D. S. Wallach. 2003. Denial of service via algorithmic complexity attacks. In Proceedings of the 12th USENIX Security Symposium, 29-44. Berkeley, CA: USENIX Press.
    • (2003)
    • Crosby, S.A.1    Wallach, D.S.2
  • 22
    • 85084162892 scopus 로고    scopus 로고
    • Using client puzzles to protect TLS
    • In Proceedings of the 10th Annual USENIX Security Symposium. Berkeley, CA: USENIX Press
    • Dean, D., and A. Stubblefield. 2001. Using client puzzles to protect TLS. In Proceedings of the 10th Annual USENIX Security Symposium. Berkeley, CA: USENIX Press.
    • (2001)
    • Dean, D.1    Stubblefield, A.2
  • 24
    • 84886199715 scopus 로고    scopus 로고
    • Cyber Defense Technology Experimental Research
    • DETER, accessed January 2, 2006
    • DETER 2005. Cyber Defense Technology Experimental Research. www.isi.edu/deter (accessed January 2, 2006).
    • (2005)
  • 25
    • 1242350165 scopus 로고    scopus 로고
    • The DoS Project's "trinoo" distributed denial of service attack tool
    • accessed January 2, 2006
    • Dittrich, D. 1999. The DoS Project's "trinoo" distributed denial of service attack tool. http://staff.washington. edu/dittrich/misc/trinoo.analysis (accessed January 2, 2006).
    • (1999)
    • Dittrich, D.1
  • 26
    • 84886129142 scopus 로고    scopus 로고
    • Evaluation methods for Internet security technology
    • EMIST, accessed January 2, 2006
    • EMIST. 2005. Evaluation methods for Internet security technology. www.isi.edu/deter/emist.temp.html (accessed January 2, 2006).
    • (2005)
  • 27
    • 0003553457 scopus 로고    scopus 로고
    • RFC 2267-Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • accessed January 2, 2006
    • Ferguson, P., and D. Senie. 1998. RFC 2267-Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. www.faqs. org/rfcs/rfc2267.html (accessed January 2, 2006)
    • (1998)
    • Ferguson, P.1    Senie, D.2
  • 28
    • 85084163167 scopus 로고    scopus 로고
    • Multops: A data-structure for bandwidth attack detection
    • In Proceedings of USENIX Security Symposium. Berkeley, CA: USENIX Press
    • Gil, T. M., and M. Poletter. 2001. Multops: A data-structure for bandwidth attack detection. In Proceedings of USENIX Security Symposium. Berkeley, CA: USENIX Press.
    • (2001)
    • Gil, T.M.1    Poletter, M.2
  • 29
    • 15944408818 scopus 로고    scopus 로고
    • Tactical bandwidth exhaustion in ad hoc networks
    • In Proceedings of the 5th Annual IEEE Information Assurance Workshop, 257-64. New York: IEEE Press
    • Gu, Q., P. Liu, and C. Chu. 2004. Tactical bandwidth exhaustion in ad hoc networks. In Proceedings of the 5th Annual IEEE Information Assurance Workshop, 257-64. New York: IEEE Press.
    • (2004)
    • Gu, Q.1    Liu, P.2    Chu, C.3
  • 30
    • 33846606856 scopus 로고    scopus 로고
    • Defending against packet injection attacks in unreliable ad hoc networks
    • Proceedings of IEEE Globecom. New York: IEEE Press
    • Gu, Q., P. Liu, S. Zhu, and C. H. Chu. 2005. Defending against packet injection attacks in unreliable ad hoc networks. Proceedings of IEEE Globecom. New York: IEEE Press.
    • (2005)
    • Gu, Q.1    Liu, P.2    Zhu, S.3    Chu, C.H.4
  • 31
    • 25844458510 scopus 로고    scopus 로고
    • Reduction of quality (RoQ) attacks on Internet end systems
    • Proceedings of INFOCOM. New York: IEEE Press
    • Guirguis, M., A. Bestavros I. Matta and Y. Zhang. 2005. Reduction of quality (RoQ) attacks on Internet end systems. Proceedings of INFOCOM. New York: IEEE Press.
    • (2005)
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 32
    • 26844502466 scopus 로고    scopus 로고
    • A preliminary simulation of the effect of scanning worm activity on multicast
    • In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Society
    • Hamadeh, I., J. Hart, G. Kesidis, and V. Pothamsetty. 2005. A preliminary simulation of the effect of scanning worm activity on multicast. In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Society.
    • (2005)
    • Hamadeh, I.1    Hart, J.2    Kesidis, G.3    Pothamsetty, V.4
  • 33
    • 55149094672 scopus 로고    scopus 로고
    • Internet denial of service considerations
    • accessed October 31, 2006
    • Handley, M. and E. Rescorla. 2006. Internet denial of service considerations. http://tools.ietf.org/html/draftiab-dos-05 (accessed October 31, 2006).
    • (2006)
    • Handley, M.1    Rescorla, E.2
  • 34
    • 26844548971 scopus 로고    scopus 로고
    • Know your enemy: Tracking botnets
    • Honeynet, accessed January 2, 2006
    • Honeynet 2005. Know your enemy: Tracking botnets. www.honeynet.org/papers/bots/(accessed January 2, 2006).
    • (2005)
  • 35
    • 0003976889 scopus 로고    scopus 로고
    • Trends in denial of service attack technology
    • accessed January 2, 2006
    • Houle, K. J., and G. M. Weaver. 2001. Trends in denial of service attack technology. www.cert.org/archive/pdf/DoS_trends.pdf (accessed January 2, 2006).
    • (2001)
    • Houle, K.J.1    Weaver, G.M.2
  • 36
    • 0004118152 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks
    • In Proceedings of ACM Mobicom, 12-23. New York: ACM Press
    • Hu, Y. C., A Perrig, and D. B. Johnson. 2002. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM Mobicom, 12-23. New York: ACM Press.
    • (2002)
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 37
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu, Y. C., A Perrig, and D. B. Johnson. 2003. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1 (1): 175-92.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 38
    • 1842569653 scopus 로고    scopus 로고
    • Implementing pushback: Router-based defense against DDoS attacks
    • In Proceedings of NDSS. Reston, VA: The Internet Society. Jian, W. 2000. A possible LAST_ACK DoS attack and fix, accessed October 31, 2006
    • Ioannidis, J., S. M. Bellovin. 2002. Implementing pushback: Router-based defense against DDoS attacks. In Proceedings of NDSS. Reston, VA: The Internet Society. Jian, W. 2000. A possible LAST_ACK DoS attack and fix. www.ussg.iu.edu/hypermail/linux/kernel/0004.1/0105. html (accessed October 31, 2006).
    • (2002)
    • Ioannidis, J.1    Bellovin, S.M.2
  • 39
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: an effective defense against spoofed DDoS traffic
    • In Proceedings of ACM CCS, 30-41. New York: ACM Press
    • Jin, C., H. Wang, and K. G. Shin. (2003). Hop-count filtering: an effective defense against spoofed DDoS traffic. In Proceedings of ACM CCS, 30-41. New York: ACM Press.
    • (2003)
    • Jin, C.1    Wang, H.2    Shin, K.G.3
  • 40
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (DSR)
    • accessed May 23, 2007
    • Johnson, D. B., D. A. Maltz, and Y-C. Hu. 2002. The dynamic source routing protocol for mobile ad hoc networks (DSR). www3.ietf.org/proceedings/04mar/ID/draft-ietf-manet-dsr-09.txt (accessed May 23, 2007).
    • (2002)
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.-C.3
  • 41
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • In Proceedings of NDSS, 151-65. Reston, VA: The Internet Society
    • Juels, A., and J. Brainard. 1999. Client puzzle: A cryptographic defense against connection depletion attacks. In Proceedings of NDSS, 151-65. Reston, VA: The Internet Society.
    • (1999)
    • Juels, A.1    Brainard, J.2
  • 42
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
    • In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation . Berkeley, CA: USENIX Press
    • Kandula S., D. Katabi, M. Jacob, and A. Berger. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation . Berkeley, CA: USENIX Press.
    • (2005)
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 44
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCPtargeted denial of service attacks
    • Proceedings of ACM SIGCOMM, 75-86. New York: ACM Press
    • Kuzmanovic, A., and E. W. Knightly. 2003. Low-rate TCPtargeted denial of service attacks. Proceedings of ACM SIGCOMM, 75-86. New York: ACM Press.
    • (2003)
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 47
    • 84886108301 scopus 로고    scopus 로고
    • MAZU Enforcer
    • MAZU, accessed January 2, 2006
    • MAZU. 2006. MAZU Enforcer. www.mazunetworks.com/products/mazu-enforcer.php. (accessed January 2, 2006).
    • (2006)
  • 49
    • 3543115759 scopus 로고    scopus 로고
    • Alliance formation for DDoS defense
    • In Proceedings of the New Security Paradigms Workshop in ACM SIGSAC. New York: ACM Press
    • Mirkovic, J., M. Robinson, P. Reiher, and G. Kuenning. 2003. Alliance formation for DDoS defense. In Proceedings of the New Security Paradigms Workshop in ACM SIGSAC. New York: ACM Press.
    • (2003)
    • Mirkovic, J.1    Robinson, M.2    Reiher, P.3    Kuenning, G.4
  • 50
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • Mirkovic, J., and P. Reiher, 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34 (2): 39-53.
    • (2004) , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 51
    • 29244475815 scopus 로고    scopus 로고
    • Internet denial of service: Attack and defense mechanisms
    • Upper Saddle River, NJ: Prentice Hall
    • Mirkovic, J., S. Dietrich, D. Dittrich, and P. Reiher. 2005. Internet denial of service: Attack and defense mechanisms . Upper Saddle River, NJ: Prentice Hall.
    • (2005)
    • Mirkovic, J.1    Dietrich, S.2    Dittrich, D.3    Reiher, P.4
  • 52
    • 37349105907 scopus 로고    scopus 로고
    • Extortion via DDoS on the rise
    • accessed October 31, 2006
    • Pappalardo, D., and E. Messmer. 2005. Extortion via DDoS on the rise. www.techworld.com/security/features/index.cfm?featureid1452 (accessed October 31, 2006).
    • (2005)
    • Pappalardo, D.1    Messmer, E.2
  • 53
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of routebased packet filtering for distributed DoS attack prevention in power-law Internets
    • In Proceedings of ACM SI. New York: ACM Press
    • Park, K., and H. Lee. 2001. On the effectiveness of routebased packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of ACM SI. New York: ACM Press.
    • (2001)
    • Park, K.1    Lee, H.2
  • 54
    • 0031247411 scopus 로고    scopus 로고
    • End-to-end routing behavior on the Internet
    • Paxson, V. 1997. End-to-end routing behavior on the Internet . IEEE/ACM Transactions on Networking, 5 (5).
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.5
    • Paxson, V.1
  • 55
    • 0003843664 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • accessed May 23, 2007
    • Perkins, C.E., E.M. Belding-Royer, and S. R. Das. 2002. Ad hoc on-demand distance vector (AODV) routing. http://tools.ietf.org/html/draft-ietf-manet-aodv-11 (accessed May 23, 2007).
    • (2002)
    • Perkins, C.E.1    Belding-royer, E.M.2    Das, S.R.3
  • 56
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • Perrig, A., R. Canetti, D. Tygar, and D. Song. 2002. The TESLA broadcast authentication protocol. Cryptobytes , 5 (2): 2-13.
    • (2002) Cryptobytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 57
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for IP traceback
    • In Proceedings of ACM SIGCOMM, 295-306. New York: ACM Press
    • Savage, S., D. Wetherall, A. Karlin, and T. Anderson. 2000. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM, 295-306. New York: ACM Press.
    • (2000)
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 60
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • In Proceedings of IEEE INFOCOM. New York: IEEE Press
    • Song, D., and A. Perrig. 2001. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM. New York: IEEE Press.
    • (2001)
    • Song, D.1    Perrig, A.2
  • 61
    • 85084162258 scopus 로고    scopus 로고
    • How to own the internet in your spare time
    • In Proceedings of the 11th USENIX Security Symposium, 207-13. Berkeley, CA: USENIX Press
    • Staniford, S., V. Paxson, and N. Weaver. 2002. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, 207-13. Berkeley, CA: USENIX Press.
    • (2002)
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 62
    • 34250620174 scopus 로고    scopus 로고
    • Net-Bouncer: Client-legitimacy-based high-performance DDoS filtering
    • In Proceedings of DARPA Information Survivability Conference and Exposition
    • Thomas, R., B. Mark, T. Johnson, and J. Croall. 2003. Net-Bouncer: Client-legitimacy-based high-performance DDoS filtering. In Proceedings of DARPA Information Survivability Conference and Exposition, 1 :14.
    • (2003) , vol.1 , pp. 14
    • Thomas, R.1    Mark, B.2    Johnson, T.3    Croall, J.4
  • 63
    • 84886207851 scopus 로고    scopus 로고
    • DoS defense by offense
    • In Proceedings of ACM SIGCOMM. New York: ACM Press
    • Walfish M., M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. 2006. DoS defense by offense. In Proceedings of ACM SIGCOMM. New York: ACM Press.
    • (2006)
    • Walfish, M.1    Vutukuru, M.2    Balakrishnan, H.3    Karger, D.4    Shenker, S.5
  • 64
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • In Proceedings of IEEE Infocom. New York: IEEE Press
    • Wang, H., D. Zhang, and K. G. Shin. 2002. Detecting SYN flooding attacks. In Proceedings of IEEE Infocom. New York: IEEE Press.
    • (2002)
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 65
    • 14844334596 scopus 로고    scopus 로고
    • Mitigating bandwidthexhaustion attacks using congestion puzzles
    • In Proceedings of ACM CCS, New York: ACM Press
    • Wang, X., and M. K. Reiter. 2004. Mitigating bandwidthexhaustion attacks using congestion puzzles. In Proceedings of ACM CCS, 257-67. New York: ACM Press.
    • (2004) , pp. 257-267
    • Wang, X.1    Reiter, M.K.2
  • 66
    • 77958453829 scopus 로고    scopus 로고
    • Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs
    • accessed January 2, 2006
    • Wullems, C., K. Tham, J. Smith, and M. Looi. 2004. Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs. www.isi.qut. edu.au/research/publications/technical/wlan.php (accessed January 2, 2006).
    • (2004)
    • Wullems, C.1    Tham, K.2    Smith, J.3    Looi, M.4
  • 67
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • In Proceeding of ACM Mobihoc, New York: ACM Press
    • Xu, W., W. Trappe, Y. Zhang, and T. Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceeding of ACM Mobihoc, 46-57. New York: ACM Press.
    • (2005) , pp. 46-57
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 68
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DoS attacks
    • In Proceedings of IEEE Symposium on Security and Privacy . New York IEEE Press
    • Yaar, A., A. Perrig, and D. Song. 2003. Pi: A path identification mechanism to defend against DoS attacks. In Proceedings of IEEE Symposium on Security and Privacy . New York IEEE Press.
    • (2003)
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 69
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
    • In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press
    • Yaar, A., A. Perrig, and D. Song. 2004. SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press.
    • (2004)
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 70
    • 25844461391 scopus 로고    scopus 로고
    • FIT: Fast internet traceback
    • In Proceedings of IEEE Infocom. New York: IEEE Press
    • Yaar, A., Perrig, A., and Song, D. 2005. FIT: Fast internet traceback. In Proceedings of IEEE Infocom. New York: IEEE Press.
    • (2005)
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 71
    • 33749866400 scopus 로고    scopus 로고
    • A DoSlimiting network architecture
    • In Proceedings of ACM SIGCOMM. New York: ACM Press
    • Yang, X., D. Wetherall, and T. Anderson. 2005. A DoSlimiting network architecture. In Proceedings of ACM SIGCOMM. New York: ACM Press.
    • (2005)
    • Yang, X.1    Wetherall, D.2    Anderson, T.3
  • 72
    • 3543100577 scopus 로고    scopus 로고
    • Statistical enroute detection and filtering of injected false data in sensor networks
    • In Proceedings of IEEE INFOCOM. New York: IEEE Press
    • Ye, F., H. Luo, S. Lu, and L. Zhang. 2004. Statistical enroute detection and filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM. New York: IEEE Press.
    • (2004)
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 73
    • 15744365243 scopus 로고    scopus 로고
    • Improvements on the WTLS protocol to avoid denial of service attacks
    • Zhang, R., and K. Chen. 2005. Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security, 24 (1): 76-82.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 76-82
    • Zhang, R.1    Chen, K.2
  • 74
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
    • In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press
    • Zhu, S., S. Setia, S. Jajodia, and P. Ning. 2004. An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy. New York: IEEE Press.
    • (2004)
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.