Remote Denial of Service Attacks and Countermeasures

作者: David Karig , Ruby Lee

DOI:

关键词: SightDenial-of-service attackComputer scienceAdversaryPanacea (medicine)Computer security

摘要: As evinced by a series of high profile attacks, denial service (DoS), or prevention legitimate access to resources, is threat that demands attention. Of particular concern are distributed in which an adversary recruits several computers aid the attack. The first major (DDoS) attack brought down University Minnesota’s network for three days August 1999. About six months later, Canadian teenager on sights including Yahoo, Amazon, eBay, CNN, and Buy.com made headlines. In accord with underlying principle destruction simpler than construction, attacks come many forms easy carry out, but preventing them can sometimes be tricky. Although there no panacea all flavors service, countermeasures focus either making more difficult attacker accountable via logging tracing.

参考文章(6)
Ari Juels, John G. Brainard, Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. network and distributed system security symposium. ,(1999)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
B.S. Davie, L.L. Peterson, Computer Networks: A Systems Approach ,(1996)
Peter Druschel, Gaurav Banga, Lazy receiver processing (LRP) Proceedings of the second USENIX symposium on Operating systems design and implementation - OSDI '96. ,vol. 30, pp. 261- 275 ,(1996) , 10.1145/238721.238786
Diane Davidowicz, Domain Name System (DNS) Security ,(1999)
R. Comerford, No longer in denial [network security] IEEE Spectrum. ,vol. 38, pp. 59- 61 ,(2001) , 10.1109/6.901143