메뉴 건너뛰기




Volumn 18, Issue 5, 2009, Pages 224-247

Defending against distributed denial of service attacks: Issues and challenges

Author keywords

Attack mechanisms; Defense mechanisms; Distributed Denial of Service (DDoS); Network security

Indexed keywords


EID: 85016036959     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550903317070     Document Type: Article
Times cited : (74)

References (108)
  • 6
    • 3242808612 scopus 로고    scopus 로고
    • 2005 australian computer crime and security survey
    • Australian Computer Emergency Response Team
    • AusCERT. (2005). 2005 Australian computer crime and security survey. Tech. Report, Australian Computer Emergency Response Team. Available at http://www.auscert.org.au/crimesurvey
    • (2005) Tech. Report
  • 9
    • 27544436002 scopus 로고    scopus 로고
    • February 10, Axent Security Team.
    • Barlow, J., and Thrower, W. (2000, February 10). TFN2K—an analysis. Axent Security Team. Available at http://security.royans.net/info/posts/bugtraq_ddos2.shtml
    • (2000) TFN2K—an Analysis.
    • Barlow, J.1    Thrower, W.2
  • 10
    • 0038059205 scopus 로고    scopus 로고
    • Ip traceback with deterministic packet marking
    • Belenky, A., and Ansari, N. (2003). IP traceback with deterministic packet marking. IEEE Communication Letter, 7(4), 162-164.
    • (2003) IEEE Communication Letter , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 12
    • 33646932291 scopus 로고    scopus 로고
    • Protection against ddos attacks based on traffic level measurements
    • San Diego, CA
    • Bencsath, B., and Vajda, I. (2004). Protection against DDoS attacks based on traffic level measurements. In Proceedings of the Western Simulation Multi Conference, San Diego, CA, pp. 22-28.
    • (2004) Proceedings of the Western Simulation Multi Conference , pp. 22-28
    • Bencsath, B.1    Vajda, I.2
  • 14
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Burton, H. Bloom. (1970, July). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM (CACM), 13(7), 422-426.
    • (1970) Communications of the ACM (CACM) , vol.13 , Issue.7 , pp. 422-426
    • Burton, H.B.1
  • 16
    • 85023951307 scopus 로고    scopus 로고
    • Knight.C sourcecode
    • July 11)
    • Bysin. (2001, July 11). Knight.c sourcecode. PacketStormSecurity.nl.
    • (2001) Packetstormsecurity.Nl
  • 17
    • 85023949031 scopus 로고    scopus 로고
    • Available at http://packetstormsecurity.nl/distributed/knight.c
  • 19
    • 0009600844 scopus 로고    scopus 로고
    • CERT Coordination Center (1999). Denial of service tools. Available at http://www.cert.org/advisories/CA-1999-17.html
    • (1999) Denial of Service Tools.
  • 20
    • 85023953007 scopus 로고    scopus 로고
    • CERT Coordination Center. (n.d.). Mail bomb attack. Available at http://www.cert.org/tech_tips/email_bombing_spamming.html
    • Mail Bomb Attack
  • 21
    • 84921023646 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-20 Continuing threats to home users, 23.
    • CERT Coordination Center. (2001). Carnegie Mellon Software Engineering Institute, CERT Advisory CA-2001-20 Continuing threats to home users, 23. Available at http://www.cert.org/advisories/CA-2001-20.html
    • (2001) Carnegie Mellon Software Engineering Institute
  • 22
    • 85023949198 scopus 로고    scopus 로고
    • CGI request attack. (n.d.). Available at
    • CERT Statistics. Available at http://www.cert.org/stats/cert_stats.html CGI request attack. (n.d.). Available at http://cpan.uwinnipeg.ca/htdocs/CGI.pm/CGI.html
  • 23
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of ddos attacks over multiple network domains
    • TPDS-0228-0806
    • Chen, Y., Hwang, K., and Ku, W. (2007, December). Collaborative detection of DDoS attacks over multiple network domains. IEEE Transaction on Parallel and Distributed Systems, TPDS-0228-0806, 18(12).
    • (2007) IEEE Transaction on Parallel and Distributed Systems , vol.18 , Issue.12
    • Chen, Y.1    Hwang, K.2    Ku, W.3
  • 24
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against dos attacks
    • Taipei, Taiwan
    • Cheng, C.M., Kung, H.T., and Tan, K.S. (2002). Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM 2002, Taipei, Taiwan, pp. 2143-2148.
    • (2002) Proceedings of IEEE GLOBECOM 2002 , pp. 2143-2148
    • Cheng, C.M.1    Kung, H.T.2    Tan, K.S.3
  • 25
    • 33144480671 scopus 로고    scopus 로고
    • Denial of service against the domain name system
    • January/February
    • Cheung, S. (2006, January/February). Denial of service against the domain name system. IEEE Security & Privacy, 4(1), 40-45.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.1 , pp. 40-45
    • Cheung, S.1
  • 27
    • 85025403958 scopus 로고    scopus 로고
    • An algebraic approach to ip traceback. Acm trans. inform
    • Dean, D., Franklin, M., and Stubblefield, A. (2002). An algebraic approach to IP traceback. ACM Trans. Inform. System Security, 5(2), 119-137.
    • (2002) System Security , vol.5 , Issue.2 , pp. 119-137
    • Dean, D.1    Franklin, M.2    Stubblefield, A.3
  • 28
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion detection systems
    • Debar, H., Dacier, M., and Wespi, A. (1999). Towards a taxonomy of intrusion detection systems. Computer Networks, 31.
    • (1999) Computer Networks , pp. 31
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 36
    • 1242321281 scopus 로고    scopus 로고
    • Ddos attacks and defense mechanisms: Classification and state-of-the-art
    • Douligeris, C., and Mitrokotsa, A. (2004, April). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643-666.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 37
    • 84893112026 scopus 로고    scopus 로고
    • Network Computing Unix World.
    • Farrow, R. (n.d.). TCP SYN Flooding attacks and remedies. Network Computing Unix World. Available at http://www.networkcomputing. com/unixworld/security/004/004.txt.html
    • TCP SYN Flooding Attacks and Remedies
    • Farrow, R.1
  • 39
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • Ferguson, P., and Senie, D. (2001). Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827.
    • (2001) RFC , pp. 2827
    • Ferguson, P.1    Senie, D.2
  • 40
    • 0027647490 scopus 로고
    • Random early detection gateways for congestion avoidance
    • Floyd, S., and Jacobon, V. (1993). Random early detection gateways for congestion avoidance. IEEE/ACM Trans. on Networking, 1(4), 397-413.
    • (1993) IEEE/ACM Trans. on Networking , vol.1 , Issue.4 , pp. 397-413
    • Floyd, S.1    Jacobon, V.2
  • 41
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the internet
    • Floyd, S., and Fall, K. (1999, August). Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Trans. on Networking, 7(4), 458-472.
    • (1999) IEEE/ACM Trans. on Networking , vol.7 , Issue.4 , pp. 458-472
    • Floyd, S.1    Fall, K.2
  • 44
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • Garber, L. (2000, April). Denial-of-service attacks rip the Internet. IEEE Computer, 33(4), 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 45
    • 0034229418 scopus 로고    scopus 로고
    • Defeating distributed denial of service attacks
    • Geng, X., and Whinston, A.B. (2000). Defeating distributed denial of service attacks. IEEE IT Professional, 2(4), 36-42.
    • (2000) IEEE IT Professional , vol.2 , Issue.4 , pp. 36-42
    • Geng, X.1    Whinston, A.B.2
  • 47
  • 52
    • 66649133397 scopus 로고    scopus 로고
    • Fvba: A combined statistical approach for low rate degrading and high bandwidth disruptive ddos attacks detection in isp domain
    • New Delhi, India, Dec. 12-14
    • Gupta, B.B., Misra, M., and Joshi, R.C. (2008). FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. In Proceedings of 16th IEEE International Conference On Networks (ICON-2008), New Delhi, India, Dec. 12-14, pp. 34-37.
    • (2008) Proceedings of 16Th IEEE International Conference on Networks (ICON-2008) , pp. 34-37
    • Gupta, B.B.1    Misra, M.2    Joshi, R.C.3
  • 54
    • 1242327641 scopus 로고    scopus 로고
    • Trinity v3, a ddos tool, hits the streets
    • Hancock, B. (2000). Trinity v3, a DDoS tool, hits the streets. Computers Security, 19(7), 574.
    • (2000) Computers Security , vol.19 , Issue.7 , pp. 574
    • Hancock, B.1
  • 59
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
    • Hwang, K., Cai, M., Chen, Y., and Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transaction on Dependable and Secure Computing, 4(1), 41-55.
    • (2007) IEEE Transaction on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 60
    • 85023948275 scopus 로고    scopus 로고
    • IRC Security. (n.d.). Available at http://www.irchelp.org/irchelp/security
  • 61
    • 85023913738 scopus 로고    scopus 로고
    • J-063: Domain name system (DNS) denial of service (DoS) attacks. (1999). Available at http://www.securityfocus.com/advisories/1727
    • (1999)
  • 62
    • 85023958311 scopus 로고    scopus 로고
    • Javvin network management & security. (n.d.). UDP Flood attack. Available at http://www.javvin.com/networkSecurity/UDPFloodAttack.html
    • UDP Flood Attack
  • 67
    • 84856757768 scopus 로고    scopus 로고
    • An integrated approach for defending against distributed denial-of-service (Ddos) attacks
    • Kumar, K., Joshi, R.C., and Singh, K. (2006). An integrated approach for defending against distributed denial-of-service (DDoS) attacks. In Proceedings of IRISS-2006, IIT Madras. Available at www.cs.iitm.ernet.in/-iriss06/iitr_krishan.pdf
    • (2006) Proceedings of IRISS-2006, IIT Madras
    • Kumar, K.1    Joshi, R.C.2    Singh, K.3
  • 70
    • 1242350164 scopus 로고    scopus 로고
    • Taxonomies of distributed denial of service networks, attacks, tools and countermeasures
    • Available at
    • Lee, R.B. (2003). Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. Princeton University. Available at http://www.ee.princeton.edu/-rblee
    • (2003) Princeton University
    • Lee, R.B.1
  • 72
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems. Acm trans
    • Lee, W., and Stolfo, S. (2000). A framework for constructing features and models for intrusion detection systems. ACM Trans. Information and System Security (TISSEC), 3(4), 227-261.
    • (2000) Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 74
    • 1842622777 scopus 로고    scopus 로고
    • A brief history of the internet
    • Leiner, B.M., Cerf, V.G., et. al. (2003). A brief history of the Internet. Internet Society. Available at http://www.isoc.org
    • (2003) Internet Society
    • Leiner, B.M.1    Cerf, V.G.2
  • 75
    • 59249106247 scopus 로고    scopus 로고
    • Ddos attacks detection model and its applications
    • Li, M., Li, M., and Jiang, X. (2008). DDoS attacks detection model and its applications. WSEAS Transactions on Computers, 7(8), 1159-1168.
    • (2008) WSEAS Transactions on Computers , vol.7 , Issue.8 , pp. 1159-1168
    • Li, M.1    Li, M.2    Jiang, X.3
  • 80
    • 84983188846 scopus 로고    scopus 로고
    • McAfee. (n.d.) Personal Firewall. Available at http://www.mcafee.com/myapps/firewal l/ov_f irewall.asp
    • Personal Firewall
  • 81
    • 0025558418 scopus 로고
    • Stochastic fairness queuing
    • Piscataway, NJ
    • Mckenny, P. (1990). Stochastic fairness queuing. In Proceeding of IEEE INFOCOM, Piscataway, NJ, pp. 733-740.
    • (1990) Proceeding of IEEE INFOCOM , pp. 733-740
    • McKenny, P.1
  • 83
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • Mirkovic, J., and Reiher, P. (2004, April). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communications Review, 34(2), 39-53.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 85
    • 29244465140 scopus 로고    scopus 로고
    • Mitigating denial of service attacks: A tutorial
    • Molsa, J. (2005). Mitigating denial of service attacks: A tutorial. Journal of Computer Security, 13, 807-837.
    • (2005) Journal of Computer Security , vol.13 , pp. 807-837
    • Molsa, J.1
  • 87
    • 0031140709 scopus 로고    scopus 로고
    • Internet security: Firewall and beyond
    • Oppliger, R. (1997). Internet security: Firewall and beyond. Communications of the ACM, 40(5), 92-102.
    • (1997) Communications of the ACM , vol.40 , Issue.5 , pp. 92-102
    • Oppliger, R.1
  • 90
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of- service attacks
    • Paxson, V. (2001). An analysis of using reflectors for distributed denial-of- service attacks. ACM SIGCOMM Computer Communications Review (CCR), 31(3), 38-47.
    • (2001) ACM SIGCOMM Computer Communications Review (CCR) , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 97
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for ip traceback
    • August, 2000, Stockholm, Sweden
    • Savage, S., Wetherall, D., Karlin, A., and Anderson, T. (2000, August). Practical network support for IP traceback. In Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, pp. 295-306.
    • (2000) Proceedings of ACM SIGCOMM , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 98
    • 85023911937 scopus 로고    scopus 로고
    • Recent dns reflector attacks
    • Available at
    • Scalzo, F. (2006). Recent DNS reflector attacks. VeriSign. Available at http://www.nanog.org/mtg-0606/pdf/frank-scalzo.pdf
    • (2006) Verisign
    • Scalzo, F.1
  • 100
    • 85023903724 scopus 로고    scopus 로고
    • Using network management system to detect distributed denial of service attacks
    • Naval Postgraduate School Monterey, CA
    • Singh Negi, C. (2001, September). Using network management system to detect distributed denial of service attacks. Master's thesis, Naval Postgraduate School Monterey, CA.
    • (2001) Master's Thesis
    • Singh Negi, C.1
  • 102
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for ip t raceback
    • Song, D.X., and Perrig, A. (2001). Advanced and authenticated marking schemes for IP T raceback. In Proceedings of IEEE INFOCOM, pp. 878-886.
    • (2001) In Proceedings of IEEE INFOCOM , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 103
    • 85023947722 scopus 로고    scopus 로고
    • Teardrop attacks. (n.d.). Available at http://www.physnet.uni-hamburg. de/physnet/security/vulnerability/teardrop.html
  • 104
    • 85023908152 scopus 로고    scopus 로고
    • The ISC Internet Domain Survey. Available at https://www.isc.org/solutions/survey
  • 106
    • 85023919329 scopus 로고    scopus 로고
    • Wikipedia. (n.d.). DNS request attack. Available at http://en.wikipedia. org/wiki/DNS_cache_poisoning
    • DNS Request Attack
  • 107
    • 85023941130 scopus 로고    scopus 로고
    • Wikipedia. (n.d.). LAND attack. Available at http://en.wikipedia.org/wiki/LAND
    • LAND Attack
  • 108
    • 28844439716 scopus 로고    scopus 로고
    • A survey of active and passive defense mechanisms against ddos attacks. Technical report, tr c04/02
    • Deakin University, Australia
    • Xiang, Y., Zhou, W., and Chowdhury, M. (2004). A survey of active and passive defense mechanisms against DDoS attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia.
    • (2004) School of Information Technology
    • Xiang, Y.1    Zhou, W.2    Chowdhury, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.