메뉴 건너뛰기




Volumn 9404, Issue , 2015, Pages 615-636

AmpPot: Monitoring and defending against amplification DDos attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; DENIAL-OF-SERVICE ATTACK;

EID: 84950320625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-26362-5_28     Document Type: Conference Paper
Times cited : (79)

References (20)
  • 1
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput
    • Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34, 39-53 (2004)
    • (2004) Commun. Rev , vol.34 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 3
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks.ACM SIGCOMM Comput
    • Paxson, V.: An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput. Commun. Rev. 31(3), 38-47 (2001)
    • (2001) Commun. Rev , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 6
    • 84950330449 scopus 로고    scopus 로고
    • NICTER (http://www.nicter.jp/)
  • 12
    • 85084096147 scopus 로고    scopus 로고
    • Tracking DDoS attacks: Insights into the business of disrupting the web
    • San Jose, CA, USA
    • Büscher, A., Holz, T.: Tracking DDoS attacks: insights into the business of disrupting the web. In: Proceedings of the 5th USENIX LEET, San Jose, CA, USA (2012)
    • (2012) Proceedings of the 5Th USENIX LEET
    • Büscher, A.1    Holz, T.2
  • 14
    • 84910140759 scopus 로고    scopus 로고
    • DNSSEC and its potential for DDoSattacks - a comprehensive measurement study
    • Vancouver, BC, Canada. ACM Press
    • van Rijswijk-Deij, R., Sperotto, A., Pras, A.: DNSSEC and its potential for DDoS attacks - a comprehensive measurement study. In: Proceedings of the Internet Measurement Conference 2014, Vancouver, BC, Canada. ACM Press (2014)
    • (2014) Proceedings of the Internetmeasurement Conference , pp. 2014
    • Van Rijswijk-Deij, R.1    Sperotto, A.2    Pras, A.3
  • 17
    • 33750376598 scopus 로고    scopus 로고
    • The nepenthesplatform: An efficient approach to collect malware
    • In: Zamboni, D., Kruegel, C.(eds.), Springer, Heidelberg
    • Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: an efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
    • (2006) RAID 2006. LNCS , vol.4219 , pp. 165-184
    • Baecher, P.1    Koetter, M.2    Holz, T.3    Dornseif, M.4    Freiling, F.C.5
  • 18
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signaturesusing honeypots. ACM SIGCOMM Comput
    • Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput. Commun. Rev. 34, 51-56 (2004)
    • (2004) Commun. Rev , vol.34 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.