메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 422-429

Requirements for a general framework for response to distributed denial-of-service

Author keywords

Asynchronous transfer mode; Authentication; Availability; Computer crime; Computer network reliability; Computer networks; Computer security; Data security; Operating systems; Web and internet services

Indexed keywords

ASYNCHRONOUS TRANSFER MODE; AUTHENTICATION; AVAILABILITY; COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; DENIAL-OF-SERVICE ATTACK; INTERNET; SECURITY OF DATA; SECURITY SYSTEMS; TRANSMISSION CONTROL PROTOCOL;

EID: 84898276661     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991559     Document Type: Conference Paper
Times cited : (8)

References (27)
  • 3
    • 0013294745 scopus 로고    scopus 로고
    • Protecting routing infrastructures from denial of service using co-operative intrusion detection
    • Cumbria UK
    • S. Cheung and K. N. Levitt, Protecting Routing Infrastructures from Denial of Service Using Co-operative Intrusion Detection, presented at Proceedings New Security Paradigms Workshop, Cumbria UK, 1997
    • (1997) Presented at Proceedings New Security Paradigms Workshop
    • Cheung, S.1    Levitt, K.N.2
  • 5
    • 84949243103 scopus 로고    scopus 로고
    • Distributed co-ordinated attacks (DCA)
    • April
    • F. Cohen, Distributed Co-ordinated Attacks (DCA), Management Analytics, April 1997. http://www.all.net/books/dca
    • (1997) Management Analytics
    • Cohen, F.1
  • 11
    • 0003553457 scopus 로고    scopus 로고
    • RFC 2267, network ingress filtering defeating denial of service attacks which employ IP source address spoofing
    • January
    • P. Ferguson, RFC 2267, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, The Internet Society, January 1998
    • (1998) The Internet Society
    • Ferguson, P.1
  • 14
  • 15
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • V.D. Gilgor and C. F. Yu, A Specification and Verification Method for Preventing Denial of Service, IEEE Transactions on Software Engineering, vol. 16, pp. 581-592, 1990
    • (1990) IEEE Transactions on Software Engineering , vol.16 , pp. 581-592
    • Gilgor, V.D.1    Yu, C.F.2
  • 17
    • 84949243108 scopus 로고    scopus 로고
    • Survivable systems concept to protect core e-business functions from denial-of-service
    • November
    • D.W. Gresty, Q. Shi, E.P. Moynihan, Survivable Systems Concept To Protect Core E-Business Functions from Denial-Of-Service, presented at BIT 2000, November 2000
    • (2000) Presented at BIT 2000
    • Gresty, D.W.1    Shi, Q.2    Moynihan, E.P.3
  • 19
    • 84949243109 scopus 로고    scopus 로고
    • The inevitability of failure: The flawed assumption of security in modern computing environments
    • P.A. Loscocco et al, The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments, presented at NIST'98, 1998. http://csrc.nist.gov/nissc/1998/proceedings/paperF1.pdf
    • (1998) Presented at NIST'98
    • Loscocco, P.A.1
  • 20
    • 77952930589 scopus 로고    scopus 로고
    • Network intrusion detection: An analyst's handbook
    • June
    • S. Northcutt, Network Intrusion Detection: An Analyst's Handbook. New Riders, ISBN: 0-7357-0868-1, June 1999
    • (1999) New Riders
    • Northcutt, S.1
  • 21
    • 84949243110 scopus 로고    scopus 로고
    • DoS: Defence is the best offence
    • February 10th
    • C. Oakes, DoS: Defence Is the Best Offence, WIRED online, February 10th 2000. http://www.wired.com/news/technology/0,1282,34230,00.html
    • (2000) WIRED Online
    • Oakes, C.1
  • 24
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • July-August
    • X. Geng, A.B. Whinston, Defeating Distributed Denial of Service Attacks, IT Professional, Vol. 2, No. 4, pp17-22, July-August 2000
    • (2000) IT Professional , vol.2 , Issue.4 , pp. 17-22
    • Geng, X.1    Whinston, A.B.2
  • 25
    • 84949243111 scopus 로고    scopus 로고
    • Issues and trends: 1999 CSI/FBI computer crime and security survey
    • Issues and Trends: 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 1999
    • (1999) Computer Security Institute
  • 26
    • 84949227816 scopus 로고    scopus 로고
    • Issues and trends: 2000 CSI/FBI computer crime and security survey
    • Issues and Trends: 2000 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2000
    • (2000) Computer Security Institute
  • 27
    • 8344227745 scopus 로고    scopus 로고
    • Carnegie Mellon University, January CERT® Advisory CA-2000-01
    • Denial-of-Service Developments, CERT® Advisory CA-2000-01, Carnegie Mellon University, January 2000. http://www.cert.org/advisories/CA-2000-01.html
    • (2000) Denial-of-Service Developments


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.