Honeypots for distributed denial-of-service attacks

作者: N. Weiler

DOI: 10.1109/ENABL.2002.1029997

关键词:

摘要: Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with have been made, but none successful by themselves. In this paper, we present system that helps defend network from DDoS attacks. addition state of art active and passive security defences, propose honeypot such The goal is simulate convincingly success compromise potential attacker. Thereby, can implement lessons learned in other systems strengthen them against On hand, protect rest our infrastructure impact an attack.

参考文章(8)
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Peter H. Salus, Vinton G. Cerf, Casting the Net: From Arpanet to Internet and Beyond ,(1995)
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, Practical network support for IP traceback acm special interest group on data communication. ,vol. 30, pp. 295- 306 ,(2000) , 10.1145/347057.347560
Alex C. Snoeren, Hash-based IP traceback Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01. ,vol. 31, pp. 3- 14 ,(2001) , 10.1145/383059.383060
Dawn Xiaodong Song, A. Perrig, Advanced and authenticated marking schemes for IP traceback international conference on computer communications. ,vol. 2, pp. 878- 886 ,(2001) , 10.1109/INFCOM.2001.916279
Vern Paxson, An analysis of using reflectors for distributed denial-of-service attacks ACM SIGCOMM Computer Communication Review. ,vol. 31, pp. 38- 47 ,(2001) , 10.1145/505659.505664