An Overview of DDoS Attacks

作者: Shui Yu

DOI: 10.1007/978-1-4614-9491-1_1

关键词:

摘要: In this chapter, we firstly review the short history of denial service (DoS) and distributed (DDoS) attacks. We further explore reasons why current cyberspace is a heaven for cyber criminals, such as DDoS attackers. present challenges related research fields from various aspects, discuss possible methods strategies to serve challenges.

参考文章(46)
Ruiping Lua, Kin Choong Yow, Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network IEEE Network. ,vol. 25, pp. 28- 33 ,(2011) , 10.1109/MNET.2011.5958005
Joseph Idziorek, Mark F. Tannian, Doug Jacobson, The Insecurity of Cloud Utility Models IT Professional. ,vol. 15, pp. 22- 27 ,(2013) , 10.1109/MITP.2012.43
Shui Yu, Wanlei Zhou, Robin Doss, Weijia Jia, Traceback of DDoS Attacks Using Entropy Variations IEEE Transactions on Parallel and Distributed Systems. ,vol. 22, pp. 412- 425 ,(2011) , 10.1109/TPDS.2010.97
David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage, Inferring Internet denial-of-service activity ACM Transactions on Computer Systems. ,vol. 24, pp. 115- 139 ,(2006) , 10.1145/1132026.1132027
Virgil D. Gligor, A Note on Denial-of-Service in Operating Systems IEEE Transactions on Software Engineering. ,vol. SE-10, pp. 320- 324 ,(1984) , 10.1109/TSE.1984.5010241
Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Your botnet is my botnet: analysis of a botnet takeover computer and communications security. pp. 635- 647 ,(2009) , 10.1145/1653662.1653738
Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee, Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces annual computer security applications conference. pp. 311- 320 ,(2009) , 10.1109/ACSAC.2009.36
Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, Manish Karir, None, A Survey of Botnet Technology and Defenses 2009 Cybersecurity Applications & Technology Conference for Homeland Security. pp. 299- 304 ,(2009) , 10.1109/CATCH.2009.40
Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang, Identifying suspicious activities through DNS failure graph analysis international conference on network protocols. pp. 144- 153 ,(2010) , 10.1109/ICNP.2010.5762763
L. Breslau, Pei Cao, Li Fan, G. Phillips, S. Shenker, Web caching and Zipf-like distributions: evidence and implications international conference on computer communications. ,vol. 1, pp. 126- 134 ,(1999) , 10.1109/INFCOM.1999.749260