메뉴 건너뛰기




Volumn 15, Issue 4, 2013, Pages 2046-2069

A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks

Author keywords

Collaborative DDoS defense; Distributed DDoS defense; Distributed Denial of Service (DDoS) flooding attack; Intrusion detection systems; Intrusion prevention systems

Indexed keywords

COLLABORATIVE DDOS DEFENSE; DISTRIBUTED DDOS DEFENSE; FLOODING ATTACKS; INTRUSION DETECTION SYSTEMS; INTRUSION PREVENTION SYSTEMS;

EID: 84888391622     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.031413.00127     Document Type: Article
Times cited : (1062)

References (149)
  • 1
    • 84888352739 scopus 로고    scopus 로고
    • Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, February 14
    • P. J. Criscuolo, Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, February 14, 2000.
    • (2000) Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319
    • Criscuolo, P.J.1
  • 2
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • April
    • J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, April 2004.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 4
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • DOI 10.1109/MCOM.2002.1039856
    • R. K. C. Chang, Defending against flooding-based distributed denial of service attacks: A tutorial, Computer J. IEEE Commun. Magazine, Vol. 40, no. 10, pp. 42-51, 2002. (Pubitemid 35311945)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 5
    • 24644463025 scopus 로고    scopus 로고
    • Aug. 08
    • R. Puri, Bots and Botnet-an overview, Aug. 08, 2003, [online] http://www.giac.org/practical/GSEC/Ramneek Puri GSEC.eps
    • (2003) Bots and Botnet-An Overview
    • Puri, R.1
  • 6
  • 7
    • 84888344992 scopus 로고    scopus 로고
    • CERT, Denial of Service Attacks, June 4
    • CERT, Denial of Service Attacks, June 4, 2001, [online] http://www.cert.org/tech tips/denial of service.html
    • (2001)
  • 9
    • 84888326668 scopus 로고    scopus 로고
    • Yahoo on Trail of Site Hackers, Wired.com, Feb. 8
    • Yahoo on Trail of Site Hackers, Wired.com, Feb. 8, 2000, [online] http://www.wired.com/news/business/0,1367,34221,00.html
    • (2000)
  • 10
    • 84888327858 scopus 로고    scopus 로고
    • Powerful Attack Cripples Internet, Oct. 23
    • Powerful Attack Cripples Internet, Oct. 23, 2002, [online] http://www.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg id=00A7G7
    • (2002)
  • 11
    • 84888333857 scopus 로고    scopus 로고
    • Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb. 6
    • Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb. 6, 2004, [online] http://www.computerworld.com/s/article/89932/Mydoom lesson Take proactive steps to prevent DDoS attacks?taxonomyId=017
    • (2004)
  • 12
    • 84888327455 scopus 로고    scopus 로고
    • Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8
    • Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8, 2009, [online] http://www.wired.com/threatlevel/2009/07/mydoom/
    • (2009)
  • 13
    • 84888352663 scopus 로고    scopus 로고
    • New "cyber attacks" hit S Korea, July 9
    • New "cyber attacks" hit S Korea, July 9, 2009, [online] http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm
    • (2009)
  • 18
    • 84888376408 scopus 로고    scopus 로고
    • Prolexic Technologies
    • Prolexic Technologies, [online] http://www.prolexic.com/index.php knowledge-center/frequently-asked-questions/index.html
  • 19
    • 0036605066 scopus 로고    scopus 로고
    • Defending wireless infrastructure against the challenge of DDoS attacks
    • DOI 10.1023/A:1014526713037, Mobile Commerce: Applications and Technologies
    • X. Geng, Y. Huang, and A. B. Whinston, Defending wireless infrastructure against the challenge of DDoS attacks, Mobile Networks and Applications, vol. 7, no. 3, pp. 213-223, 2002. (Pubitemid 34414752)
    • (2002) Mobile Networks and Applications , vol.7 , Issue.3 , pp. 213-223
    • Geng, X.1    Huang, Y.2    Whinston, A.B.3
  • 22
    • 70350389209 scopus 로고    scopus 로고
    • Blue versus red: Towards a model of distributed security attacks
    • Roger Dingledine and Philippe Golle (Eds.). Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg.
    • N. Fultz, and J. Grossklags, Blue versus Red: Towards a Model of Distributed Security Attacks, In Financial Cryptography and Data Security, Roger Dingledine and Philippe Golle (Eds.). Lecture Notes in Computer Science, vol. 5628, Springer-Verlag, pp. 167-183, 2009, Berlin, Heidelberg.
    • (2009) Financial Cryptography and Data Security , vol.5628 , pp. 167-183
    • Fultz, N.1    Grossklags, J.2
  • 24
    • 84888316221 scopus 로고    scopus 로고
    • [online] http://isc.sans.edu/diary.html?storyid=6622
  • 25
    • 84888367910 scopus 로고    scopus 로고
    • [online] http://techcrunch.com/2010/11/28/wikileaks-ddos-attack/
  • 26
    • 84888348782 scopus 로고    scopus 로고
    • [online] http://www.sbsun.com/ci 21392063/us-general-we-hacked-enemy- afghanistan
  • 27
    • 84888343743 scopus 로고    scopus 로고
    • [online] http://www.gideonrasmussen.com/article-14.html
  • 28
    • 84888340943 scopus 로고    scopus 로고
    • [online] http://online.wsj.com/article/SB123914805204099085.html
  • 29
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • DOI 10.1145/1053283.1053288
    • P. Liu, W. Zang, and M. Yu, Incentive-based modeling and inference of attacker intent, objectives, and strategies, ACM Trans. Inf. Syst. Secur. vol. 8, no. 1, pp. 78-118, February 2005. (Pubitemid 40479430)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 31
    • 10644248262 scopus 로고    scopus 로고
    • Characterization of defense mechanisms against distributed denial of service attacks
    • December
    • L. C. Chen, T. A. Longstaff, and K. M. Carley, Characterization of defense mechanisms against distributed denial of service attacks, Computers & Security, vol. 23, no. 8, pp. 665-678, December 2004.
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 665-678
    • Chen, L.C.1    Longstaff, T.A.2    Carley, K.M.3
  • 32
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Article 3, April
    • T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Comput. Surv. 39, 1, Article 3, April 2007.
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 35
    • 84888365849 scopus 로고    scopus 로고
    • RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioReyTaxonomy Rev 2.3 2012, 2012
    • RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioReyTaxonomy Rev 2.3 2012, 2012. [online] http://www.riorey.com/x-resources/2012/RioRey Taxonomy DDoS Attacks 2012.eps
  • 36
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and state-of-Tfhe-art
    • April
    • C. Douligeris, and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, Vol. 44, No. 5, pp. 643-666, April 2004.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 37
    • 61449207953 scopus 로고    scopus 로고
    • DDoS-shield: Ddos-resilient scheduling to counter application layer attacks
    • February
    • S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer attacks, IEEE/ACM Trans. Netw., Vol. 17, No. 1, pp. 2639, February 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 2639
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Nucci, A.4    Knightly, E.5
  • 38
    • 84888332255 scopus 로고    scopus 로고
    • Arbor Application Brief: The Growing Threat of Application-Layer DDoS Attacks, Arbor Networks, Feb. 28
    • Arbor Application Brief: The Growing Threat of Application-Layer DDoS Attacks, Arbor Networks, Feb. 28, 2011, [online] http://www.arbornetworks.com/ component/docman/doc download/467-the-growing-threat-of-application-layer-ddos- attacks?Itemid=442.
    • (2011)
  • 40
    • 84888344007 scopus 로고    scopus 로고
    • ha.ckers.org, Slowloris HTTP DoS, Retrieved Oct. 19
    • ha.ckers.org, Slowloris HTTP DoS, Retrieved Oct. 19, 2012, [online] http://ha.ckers.org/slowloris/
    • (2012)
  • 45
    • 84888309586 scopus 로고    scopus 로고
    • April
    • J. Lo et al., An IRC Tutorial, April, 2003, irchelp.com 1997, [online] http://www.irchelp.org/irchelp/irctutorial.html#part1.
    • (2003) An IRC Tutorial
    • Lo, J.1
  • 46
    • 1242327641 scopus 로고    scopus 로고
    • Trinity v3, a DDoS tool, hits the streets
    • Nov.
    • B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers & Security, Vol. 19, no. 7, pp. 574-574, Nov., 2000.
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 574-574
    • Hancock, B.1
  • 47
    • 84888360917 scopus 로고    scopus 로고
    • Bysin, knight.c sourcecode
    • Bysin, knight.c sourcecode, 2001, [online] http://packetstormsecurity. org/distributed/knight.c.
    • (2001)
  • 48
    • 84888351498 scopus 로고    scopus 로고
    • team-cymru Inc., A Taste of HTTP Botnets, July
    • team-cymru Inc., A Taste of HTTP Botnets, July, 2008, [online] http://www.team-cymru.com/ReadingRoom/Whitepapers/2008/httpbotnets. eps
    • (2008)
  • 49
    • 51949113131 scopus 로고    scopus 로고
    • Arbor Networks
    • J. Nazario, BlackEnergy DDoS Bot Analysis, Arbor Networks, 2007, [online] http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+ Analysis.eps
    • (2007) BlackEnergy DDoS Bot Analysis
    • Nazario, J.1
  • 50
    • 84888370392 scopus 로고    scopus 로고
    • Praetox Technologies Low Orbit Ion Cannon
    • Praetox Technologies Low Orbit Ion Cannon, 2010, [online] https://github.com/NewEraCracker/LOIC/
    • (2010)
  • 53
    • 84888351985 scopus 로고    scopus 로고
    • [online] http://infosecisland.com/blogview/12395-DDoS-Attack-Utilizes- Self-Destructing-Botnet.html
  • 54
    • 84888319451 scopus 로고    scopus 로고
    • Cisco, IPS 7.0 Global Correlation
    • Cisco, IPS 7.0 Global Correlation, 2009, [online] http://www.cisco.com/ en/US/docs/security/ips/7.0/configuration /guide/ime/ime collaboration.html
    • (2009)
  • 60
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Washington, DC, August 13-17
    • T. M. Gil, and M. Poleto, MULTOPS: a data-structure for bandwidth attack detection, in Proc. 10th Usenix Security Symposium, Washington, DC, pp. 2338, August 13-17, 2001.
    • (2001) Proc. 10th Usenix Security Symposium , pp. 2338
    • Gil, T.M.1    Poleto, M.2
  • 62
    • 84888327781 scopus 로고    scopus 로고
    • Mananet, Reverse Firewall
    • Mananet, Reverse Firewall, [online] http://www.cs3-inc.com/pubs/Reverse FireWall.eps
  • 65
    • 33645822113 scopus 로고    scopus 로고
    • Novel hybrid schemes employing packet marking and logging for ip traceback
    • May
    • B. Al-Duwairi, and G. Manimaran, Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback, IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 5, pp. 403-418, May 2006.
    • (2006) IEEE Trans. Parallel Distrib. Syst. , vol.17 , Issue.5 , pp. 403-418
    • Al-duwairi, B.1    Manimaran, G.2
  • 68
    • 0004606473 scopus 로고    scopus 로고
    • in Wired TechnologyNews
    • J. Glave, Smurfing cripples ISPs, in Wired TechnologyNews, 1998, [online] http://www.wired.com/news /news/technology/story/9506.html
    • (1998) Smurfing Cripples ISPs
    • Glave, J.1
  • 69
    • 79952585972 scopus 로고    scopus 로고
    • DDoS detection and traceback with decision tree and grey relational analysis
    • Y. C. Wu, H. R. Tseng, W. Yang, and R. H. Jan, DDoS detection and traceback with decision tree and grey relational analysis, Int. J. Ad Hoc Ubiquitous Comput., vol. 7, no. 2, pp. 121-136, 2011.
    • (2011) Int. J. Ad Hoc Ubiquitous Comput. , vol.7 , Issue.2 , pp. 121-136
    • Wu, Y.C.1    Tseng, H.R.2    Yang, W.3    Jan, R.H.4
  • 70
    • 51149105210 scopus 로고    scopus 로고
    • Proactive detection of distributed denial of service attacks using mib traffic variables - A feasibility study
    • B. Joao, D. Cabrera, and et al., Proactive Detection of Distributed Denial of Service Attacks Using MIB Traffic Variables - A Feasibility Study, Integrated Network Management Proceedings, pp. 609-622, 2001.
    • (2001) Integrated Network Management Proceedings , pp. 609-622
    • Joao, B.1    Cabrera, D.2
  • 73
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attacks using history-based IP filtering
    • May
    • T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, ICC '03. May , Vol.1, pp: 482-486, 2003.
    • (2003) ICC '03 , vol.1 , pp. 482-486
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 74
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • DOI 10.1109/TNET.2006.890133
    • H. Wang, C. Jin, and K. G. Shin, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Trans. Netw., vol. 15, no. 1, pp.40-53, February 2007. (Pubitemid 46464416)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 75
    • 84875537965 scopus 로고    scopus 로고
    • University of Pittsburgh, Department of Computer Science, Technical Report. TR-11-178, March
    • M. Abliz, Internet Denial of Service Attacks and Defense Mechanisms, University of Pittsburgh, Department of Computer Science, Technical Report. TR-11-178, March 2011.
    • (2011) Internet Denial of Service Attacks and Defense Mechanisms
    • Abliz, M.1
  • 77
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks, IEEE Trans. Dependable Secure Computing, vol. 3, no. 2, pp. 141-155, 2006.
    • (2006) IEEE Trans. Dependable Secure Computing , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 78
    • 33749851980 scopus 로고    scopus 로고
    • Intrusion detection routers: Design, implementation and evaluation using an experimental testbed
    • E. Y. K. Chan et al., Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed, IEEE J. Sel. Areas Commun., vol. 24, no. 10, pp. 1889-1900, 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.10 , pp. 1889-1900
    • Chan, E.Y.K.1
  • 79
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • K. Park, and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in Proc. IEEE INFOCOM 2001, pp. 338347.
    • (2001) Proc. IEEE INFOCOM , pp. 338347
    • Park, K.1    Lee, H.2
  • 80
    • 0001083965 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets
    • August
    • K. Park, and H. Lee, On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets, in Proc. ACM SIGCOMM, August 2001.
    • (2001) Proc. ACM SIGCOMM
    • Park, K.1    Lee, H.2
  • 81
    • 41949118967 scopus 로고    scopus 로고
    • Detecting compromised routers via packet forwarding behavior
    • DOI 10.1109/MNET.2008.4476069, Internet Scalability: Properties and Evolution
    • A. T. Mizrak, S. Savage, and K. Marzullo, Detecting compromised routers via packet forwarding behavior, IEEE Network, pp.34-39, 2008. (Pubitemid 351514029)
    • (2008) IEEE Network , vol.22 , Issue.2 , pp. 34-39
    • Mizrak, A.T.1    Savage, S.2    Marzullo, K.3
  • 84
    • 80052081335 scopus 로고    scopus 로고
    • A trust-based approach against IP-spoofing attacks
    • J. M. Gonzalez, M. Anwar, and J. B. D. Joshi, A trust-based approach against IP-spoofing attacks, in Proc. IEEE PST, pp. 63-70, 2011.
    • (2011) Proc. IEEE PST , pp. 63-70
    • Gonzalez, J.M.1    Anwar, M.2    Joshi, J.B.D.3
  • 87
    • 24344506095 scopus 로고    scopus 로고
    • Scalable coordination techniques for distributed network monitoring
    • Passive and Active Network Measurement - 6th International Workshop, PAM 2005, Proceedings
    • M. R. Sharma, and J. W. Byers, Scalable Coordination Techniques for Distributed Network Monitoring, in Proc. PAM, pp. 349-352, 2005. (Pubitemid 41252763)
    • (2005) Lecture Notes in Computer Science , vol.3431 , pp. 349-352
    • Sharma, M.R.1    Byers, J.W.2
  • 90
    • 0038404196 scopus 로고    scopus 로고
    • Defending against distributed denial of service attacks using max-min fair server centric router throttles
    • D. Yau, J. C. S. Lui, and F. Liang, Defending against distributed denial of service attacks using max-min fair server centric router throttles, IEEE international conference on Quality of Service. 2002.
    • (2002) IEEE International Conference on Quality of Service
    • Yau, D.1    Lui, J.C.S.2    Liang, F.3
  • 95
    • 18144411533 scopus 로고    scopus 로고
    • Preventing internet denial-of-service with capabilities
    • T. Anderson, T. Roscoe, and D. Wetherall, Preventing Internet denial-of-service with capabilities, SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp. 39-44, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.1 , pp. 39-44
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 97
    • 57949103947 scopus 로고    scopus 로고
    • TVA: A DoS-limiting network architecture
    • X. Yang, D. Wetherall, and T. Anderson, TVA: a DoS-limiting network architecture, IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267-1280, 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1267-1280
    • Yang, X.1    Wetherall, D.2    Anderson, T.3
  • 103
    • 69249233518 scopus 로고    scopus 로고
    • Scalable network-layer defense against internet bandwidth-flooding attacks
    • August
    • K. Argyraki, and D. R. Cheriton, Scalable network-layer defense against internet bandwidth-flooding attacks, in IEEE/ACM Trans. Netw., 17(4), pp. 1284-1297, August 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.4 , pp. 1284-1297
    • Argyraki, K.1    Cheriton, D.R.2
  • 107
    • 84888357473 scopus 로고    scopus 로고
    • IPTraf tool, An IP Network Monitor
    • IPTraf tool, An IP Network Monitor, [online] http://iptraf.seul.org/
  • 109
    • 61449207953 scopus 로고    scopus 로고
    • DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
    • February
    • S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, DDoS-shield: DDoS-resilient scheduling to counter application layer attacks, IEEE/ACM Trans. Netw., Vol. 17, no. 1, pp. 26-39, February 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 26-39
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Nucci, A.4    Knightly, E.5
  • 110
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • February
    • Y. Xie, and S. Z. Yu, A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors, IEEE/ACM Trans. Netw. (TON), Vol. 17, no. 1, pp. 54-65, February 2009.
    • (2009) IEEE/ACM Trans. Netw. (TON) , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.Z.2
  • 117
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
    • July
    • M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, Mitigating application-level denial of service attacks on Web servers: A client-transparent approach, ACM Trans. Web (TWEB), Vol. 2, no. 3, July 2008.
    • (2008) ACM Trans. Web (TWEB) , vol.2 , Issue.3
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 118
    • 84868307433 scopus 로고    scopus 로고
    • A lightweight mechanism to mitigate application layer ddos attacks
    • J. Yu, C. Fang, L. Lu, and Z. Li, A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks, in Proc. Infoscale 2009, LNICST 18, pp. 175191, 2009.
    • (2009) Proc. Infoscale 2009, LNICST 18 , pp. 175191
    • Yu, J.1    Fang, C.2    Lu, L.3    Li, Z.4
  • 120
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • X. Geng, and A. B. Whinston, Defeating Distributed Denial of Service attacks, IEEE IT Professional, 2(4), pp. 36-42, 2002.
    • (2002) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-42
    • Geng, X.1    Whinston, A.B.2
  • 121
    • 84888345243 scopus 로고    scopus 로고
    • Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks, Retrieved Oct. 19
    • Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks, Retrieved Oct. 19, 2012, [online] http://www.cisco.com/en/US/tech/tk59/ technologies/white paper09186a 0080174a5b.shtml
    • (2012)
  • 124
    • 0008922435 scopus 로고    scopus 로고
    • The xenoservice-A distributed defeat for distributed denial of service
    • October
    • J. Yan, S. Early, and R. Anderson, The XenoService-A Distributed Defeat for Distributed Denial of Service, in Proc. ISW 2000, October 2000.
    • (2000) Proc. ISW 2000
    • Yan, J.1    Early, S.2    Anderson, R.3
  • 125
    • 84888326398 scopus 로고    scopus 로고
    • ICANN Report, DNS Distributed Denial of Service (DDoS) Attacks, Security and Stability Advisory Committee (SSAC), March 2006
    • ICANN Report, DNS Distributed Denial of Service (DDoS) Attacks, Security and Stability Advisory Committee (SSAC), March 2006.
  • 130
    • 84856180872 scopus 로고    scopus 로고
    • An integrated victim-based approach against ip packet flooding denial of service
    • October
    • R. M. Mutebi, and I. A. Rai, An Integrated Victim-based Approach against IP Packet Flooding Denial of Service, International J. Computing and ICT Research, Special Issue Vol. 4, No. 1, pp. 70-80, October 2010.
    • (2010) International J. Computing and ICT Research, Special Issue , vol.4 , Issue.1 , pp. 70-80
    • Mutebi, R.M.1    Rai, I.A.2
  • 131
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • V. A. Siris, and F. Papaglou, Application of anomaly detection algorithms for detecting syn flooding attacks, in Proc. IEEE GLOBECOM, 2004.
    • (2004) Proc. IEEE GLOBECOM
    • Siris, V.A.1    Papaglou, F.2
  • 132
    • 29244465140 scopus 로고    scopus 로고
    • Mitigating denial of service attacks: A tutorial
    • J. Mls, Mitigating denial of service attacks: A tutorial, J. Computer Security, Vol. 13, No. 6, pp. 807-837, 2005.
    • (2005) J. Computer Security , vol.13 , Issue.6 , pp. 807-837
    • Mls, J.1
  • 133
    • 0031255580 scopus 로고    scopus 로고
    • Selecting and interpreting measures of thematic classification accuracy
    • DOI 10.1016/S0034-4257(97)00083-7, PII S0034425797000837
    • S. V. Stehman, "Selecting and interpreting measures of thematic classification accuracy". Remote Sensing of Environment, Vol. 62, No. 1, pp. 77-89, 1997. (Pubitemid 28052020)
    • (1997) Remote Sensing of Environment , vol.62 , Issue.1 , pp. 77-89
    • Stehman, S.V.1
  • 138
    • 34250009730 scopus 로고    scopus 로고
    • Cyberinsurance in IT security management
    • DOI 10.1109/MSP.2007.57
    • W. S. Baer, and A. Parkinson, Cyberinsurance in IT Security Management, IEEE Security & Privacy, Vol. 5, No. 3, pp. 50-56, May-June 2007. (Pubitemid 46883434)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 50-56
    • Baer, W.S.1    Parkinson, A.2
  • 139
    • 84888315472 scopus 로고    scopus 로고
    • The economic viability of cyber insurance: Seeking financial certainty in it security
    • Harvard, MA, June
    • T. Bosco, The Economic Viability of Cyber Insurance: Seeking Financial Certainty in IT Security, in Proc. WEIS'05, Harvard, MA, June 2005.
    • (2005) Proc. WEIS'05
    • Bosco, T.1
  • 140
    • 36549054759 scopus 로고    scopus 로고
    • An early application of the Bell Labs security framework to analyze vulnerabilities in the internet telephony domain
    • DOI 10.1002/bltj.20246
    • V. J. Gurbani, and A. R. McGee, An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain, Bell Labs Technical Journal-Information Technology/Network Security, Vol. 12, No. 3, pp. 7-19, September 2007. (Pubitemid 350189033)
    • (2007) Bell Labs Technical Journal , vol.12 , Issue.3 , pp. 7-19
    • Gurbani, V.K.1    McGee, A.R.2
  • 144
    • 84888380813 scopus 로고    scopus 로고
    • Neustar Insights: DDoS Survey Q1
    • DDoS Survey: Q1 2012 When Businesses Go Dark, Neustar Insights: DDoS Survey Q1 2012, [online] http://hello.neustar.biz/rs/neustarinc/images/neustar- insights-ddos-attack-survey-q1-2012.eps
    • (2012) DDoS Survey: Q1 2012 When Businesses Go Dark
  • 145
    • 84888351653 scopus 로고    scopus 로고
    • Service Provider Security, Cisco systems
    • Service Provider Infrastructure Security Techniques, Service Provider Security, Cisco systems, [online] http://www.cisco.com/web/about/security/ intelligence/sp infrastruct scty.html
    • Service Provider Infrastructure Security Techniques
  • 149
    • 78650562912 scopus 로고    scopus 로고
    • McKinsey Quarterly, March
    • M. Chui, M. Lffler, and R. Roberts, The Internet of Things, McKinsey Quarterly, March 2010, [online] http://www.mckinseyquarterly.com/The Internet of Things 2538
    • (2010) The Internet of Things
    • Chui, M.1    Lffler, M.2    Roberts, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.