메뉴 건너뛰기




Volumn , Issue , 2004, Pages 543-550

Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; TAXONOMIES;

EID: 85132972574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (207)

References (25)
  • 1
    • 25544447732 scopus 로고    scopus 로고
    • Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, Oct
    • David Karig and Ruby Lee, "Remote Denial of Service Attacks and Countermeasures, " Princeton University Department of Electrical Engineering Technical Report CE-L2001-002, Oct. 2001.
    • (2001) Remote Denial of Service Attacks and Countermeasures
    • Karig, David1    Lee, Ruby2
  • 2
    • 84889341449 scopus 로고    scopus 로고
    • Wired.com, Feb. 8, (15 May 2003)
    • "Yahoo on Trail of Site Hackers", Wired.com, Feb. 8, 2000. http://www.wired.eom/news/business/0, 1367, 34221, 00.html (15 May 2003).
    • (2000) Yahoo on Trail of Site Hackers
  • 3
    • 85045186270 scopus 로고    scopus 로고
    • Spam Block Lists Bombed to Oblivion
    • MSNBC. COM 24 Sept (Jul. 5, 2004)
    • Brunker, Mike. "Spam Block Lists Bombed to Oblivion". MSNBC. COM 24 Sept 2003. http://www.msnbc.msn. com/id/3088113/(Jul. 5, 2004).
    • (2003)
    • Brunker, Mike1
  • 4
    • 0003976889 scopus 로고    scopus 로고
    • CERT Coordination Center, Carnegie Mellon Software Engineering Institute. Oct. (14 Mar. 2003)
    • Kevin J. Houle. "Trends in Denial of Service Attack Technology". CERT Coordination Center, Carnegie Mellon Software Engineering Institute. Oct. 2001. www.nanog.org/mtg-0110/ppt/houle.ppt. (14 Mar. 2003).
    • (2001) Trends in Denial of Service Attack Technology
    • Houle, Kevin J.1
  • 5
    • 0008723266 scopus 로고    scopus 로고
    • Distributed Denial of Service TrinOO, Tribe Flood Network, Tribe Flood Network 2000, And StacheldrahtCIAC-2319
    • Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, Feb. 14
    • Paul J. Criscuolo. "Distributed Denial of Service TrinOO, Tribe Flood Network, Tribe Flood Network 2000, And StacheldrahtCIAC-2319". Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, Feb. 14, 2000.
    • (2000)
    • Criscuolo, Paul J.1
  • 6
    • 85132972723 scopus 로고    scopus 로고
    • TFreak. Oct. www.phreak.org/archives/exploits/denial/srnurf.c (6 May 2003)
    • TFreak. "smurf.c", www.phreak.org. Oct. 1997. www.phreak.org/archives/exploits/denial/srnurf.c (6 May 2003).
    • (1997) smurf.c
  • 8
    • 85133025041 scopus 로고    scopus 로고
    • TFreak. (6 May)
    • TFreak. "fraggle.c", www.phreak.org, www.phreak.org/archives/exploits/denial/fraggle.c (6 May 2003).
    • (2003) fraggle.c
  • 9
    • 85058655769 scopus 로고    scopus 로고
    • Router Expert: Smurf/Fraggle Attack Defense Using SACLS
    • Oct. http://searchnetworking.techtarget.com/tip/l, 289483, sid7_gci85 6112, 00.html (6 May 2003)
    • Martin, Michael J., "Router Expert: Smurf/Fraggle Attack Defense Using SACLS", Networking Tips and Newsletters, www.searchnetwork.techtarget.com. Oct. 2002. http://searchnetworking.techtarget.com/tip/l, 289483, sid7_gci85 6112, 00.html (6 May 2003).
    • (2002) Networking Tips and Newsletters
    • Martin, Michael J.1
  • 10
    • 66249104798 scopus 로고    scopus 로고
    • Insecure.org. August (8 Apr. 2003)
    • "Nmap Stealth Port Scanner Introduction", Insecure.org. August 2002. http://www.insecure.org/nmap/. (8 Apr. 2003).
    • (2002) Nmap Stealth Port Scanner Introduction
  • 11
    • 85132999935 scopus 로고    scopus 로고
    • CVE (version 20020625) Mar. 27, (9 Apr. 2003)
    • "CVE (version 20020625) ", Common Vulnerabilities and Exposures. Mar. 27, 2002. http://cve.mitre.org/cve/. (9 Apr. 2003).
    • (2002) Common Vulnerabilities and Exposures
  • 14
    • 85133010119 scopus 로고    scopus 로고
    • Microsoft. Microsoft Corporation. Jun. (5 Apr. 2003)
    • Microsoft. "How to Write Active X Controls for Microsoft Windows CE2.1", Microsoft Corporation. Jun. 1999. http://msdn. microsoft.com/library/default.asp7urWlibrary/en-us/dnce21/html/activexce.asp. (5 Apr. 2003).
    • (1999) How to Write Active X Controls for Microsoft Windows CE2.1
  • 15
    • 85133029713 scopus 로고    scopus 로고
    • The Complete Windows Trojans Paper
    • Oct. 22, (9 Apr. 2003)
    • Dancho Danchev. "The Complete Windows Trojans Paper", BCVG Network Security. Oct. 22, 2002. http://www.ebcvg.com/articles.php?id=91. (9 Apr. 2003).
    • (2002) BCVG Network Security
    • Danchev, Dancho1
  • 17
    • 85116622290 scopus 로고    scopus 로고
    • How Hackers Do It: Tricks, Tools, and Techniques
    • ™Online. Part No.: 816-4816-10, Revision 1.0. May (8 Apr. 2003)
    • ™Online. Part No.: 816-4816-10, Revision 1.0. May 2002. http://www.sun. com/solutions/blueprints/0502/816-4816-10.pdf. (8 Apr. 2003).
    • (2002)
    • Noordergraff, Alex1
  • 23
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denial of Service Attacks
    • Iss. Jul
    • Vern Paxon, "An Analysis of Using Reflectors for Distributed Denial of Service Attacks", ACMSIGCOMM Computer Communication Review, Vol. 31, Iss. 3, Jul. 2001.
    • (2001) ACMSIGCOMM Computer Communication Review , vol.31 , Issue.3
    • Paxon, Vern1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.