Survey of network-based defense mechanisms countering the DoS and DDoS problems

作者: Tao Peng , Christopher Leckie , Kotagiri Ramamohanarao

DOI: 10.1145/1216370.1216373

关键词: Computer securityBotnetThe InternetIP tracebackInternet securityComputer scienceDenial-of-service attackStrengths and weaknessesIP address spoofingTrinoo

摘要: This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in …

参考文章(81)
Robert Stone, Centertrack: an IP overlay network for tracking DoS floods usenix security symposium. pp. 15- 15 ,(2000)
B. E. Brodsky, B. S. Darkhovsky, Nonparametric methods in change-point problems Kluwer Academic Publishers. ,(1993) , 10.1007/978-94-015-8163-9
Peter Reiher, Sven Dietrich, Jelena Mirkovic, David Dittrich, Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) Prentice Hall PTR. ,(2004)
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Proactively detecting distributed denial of service attacks using source IP address monitoring Lecture Notes in Computer Science. pp. 771- 782 ,(2004) , 10.1007/978-3-540-24693-0_63
Thomer M. Gil, Massimiliano Poletto, MULTOPS: a data-structure for bandwidth attack detection usenix security symposium. pp. 3- 3 ,(2001) , 10.21236/ADA401819
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering international conference on communications. ,vol. 1, pp. 482- 486 ,(2003) , 10.1109/ICC.2003.1204223
Chen-Mou Cheng, H.T. Kung, Koan-Sin Tan, Use of spectral analysis in defense against DoS attacks global communications conference. ,vol. 3, pp. 2143- 2148 ,(2002) , 10.1109/GLOCOM.2002.1189011
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Adjusted Probabilistic Packet Marking for IP Traceback international ifip tc networking conference. pp. 697- 708 ,(2002) , 10.1007/3-540-47906-6_56