Amplification and DRDoS Attack Defense - A Survey and New Perspectives.

作者: Matthew Orlinski , Matthias Wählisch , Christian Rossow , Thomas C. Schmidt , Fabrice J. Ryba

DOI:

关键词:

摘要: … of the amplification attacks surveyed, we also survey state-ofthe-art of spoofing defenses as well … This work acts as an introduction into many different types of amplification attacks and …

参考文章(143)
A. Mankin, D. Massey, Chien-Lung Wu, S.F. Wu, Lixia Zhang, On design and evaluation of "intention-driven" ICMP traceback international conference on computer communications and networks. pp. 159- 165 ,(2001) , 10.1109/ICCCN.2001.956234
Pekka Nikander, Robert Moskowitz, Host Identity Protocol (HIP) Architecture RFC 4423. ,vol. 4423, pp. 1- 24 ,(2006)
Wesley M. Eddy, TCP SYN Flooding Attacks and Common Mitigations RFC. ,vol. 4987, pp. 1- 19 ,(2007)
P. Francis, K. Egevang, The IP Network Address Translator (NAT) RFC. ,vol. 1631, pp. 1- 10 ,(1994)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
Wu-chang Feng, E. Kaiser, Wu-chi Feng, A. Luu, Design and implementation of network puzzles international conference on computer communications. ,vol. 4, pp. 2372- 2382 ,(2005) , 10.1109/INFCOM.2005.1498523
Nur Izura Udzir, Mohamed Othman, Soon Lee, IP spoofing defense: an introduction ,(2009)
R. Atkinson, S. Kent, IP Encapsulating Security Payload (ESP) RFC. ,vol. 1827, pp. 1- 12 ,(1995)
H. Ishibashi, N. Yamai, K. Abe, T. Matsuura, A protection method against unauthorized access and address spoofing for open network access systems pacific rim conference on communications, computers and signal processing. ,vol. 1, pp. 10- 13 ,(2001) , 10.1109/PACRIM.2001.953510
A. Bremler-Barr, H. Levy, Spoofing prevention method international conference on computer communications. ,vol. 1, pp. 536- 547 ,(2005) , 10.1109/INFCOM.2005.1497921