Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

作者: Felix C. Freiling , Thorsten Holz , Georg Wicherski

DOI: 10.1007/11555827_19

关键词:

摘要: Abstract Denial-of-Service (DoS) attacks pose a significant threat to the Internet today especially if they are distributed, ie, launched simultaneously at a large number of systems …

参考文章(33)
Bruce Schneier, Semantic network attacks. Communications of The ACM. ,vol. 43, pp. 168- ,(2000)
Peter Reiher, Sven Dietrich, Jelena Mirkovic, David Dittrich, Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) Prentice Hall PTR. ,(2004)
Matthias Jarke, Martin Staudt, Incremental Maintenance of Externally Materialized Views very large data bases. pp. 75- 86 ,(1996)
C. Lewerentz, M. Nagl, B. Westfechtel, On Integration Mechanisms within a Graph-based Software Development Environment workshop on graph theoretic concepts in computer science. pp. 21- 229 ,(1987) , 10.1007/3-540-19422-3_17
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
Bernd Heinrichs, Kai Jakobs, Timer Handling in High-Performance Transport Systems Proceedings of the IFIP TC6/ICCC International Conference on Integrated Broadband Communication Networks and Services. pp. 337- 348 ,(1993) , 10.1016/B978-0-444-81584-2.50035-5
M.O. Berger, k-coloring vertices using a neural network with convergence to valid solutions world congress on computational intelligence. ,vol. 7, pp. 4514- 4517 ,(1994) , 10.1109/ICNN.1994.375000
Steven Bellovin, Marcus Leech, Tom Taylor, ICMP Traceback Messages Internet Draft: draft-bellovin-itrace-00. txt. ,(2003) , 10.7916/D8FF406R
Rainer Gallersdörfer, Matthias Jarke, Karin Klabunde, Intelligent networks as a data intensive application (INDIA) International Conference on Applications of Databases. pp. 458- 471 ,(1994) , 10.1007/3-540-58183-9_66
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)