최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국시뮬레이션학회논문지 = Journal of the Korea Society for Simulation, v.19 no.4, 2010년, pp.139 - 149
장범수 (한양대학교 전자컴퓨터통신공학과) , 이주영 (서경대학교 전자공학과) , 정재일 (한양대학교 전자컴퓨터통신공학과)
Internet was designed for network scalability and best-effort service which makes all hosts connected to Internet to be vulnerable against attack. Many papers have been proposed about attack detection algorithms against the attack using IP spoofing and DoS/DDoS attack. Purpose of DoS/DDoS attack is ...
Tao PENG, Christopher Leckie, and Kotagiri Ramamo hanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39, no. 1, 2007.
Jelena Mirikovic, and Peter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, Apr. 2004.
Rocky K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," Communications Magazine, IEEE, vol. 40, no. 10, pp. 42-51, Oct. 2002.
Glenn Carl, George Kesidis, Richard R. Brooks, and Suresh Rai, "Denial-of-Service Attack-Detection Techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82- 89, Jan.-Feb. 2006.
Amey Shevtekar, Karunakar Anantharam, and Nirwan Ansari, "Low Rate TCP Denial-of-Service Attack Detection at Edge Routers," IEEE Communications Letters, vol. 9, no. 4, pp. 363-365, Apr. 2005.
Wei Chen, Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types IP Spoofing," Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 38, 2006.
Michael Collins, Michael K. Reiter, "An Empirical Analysis of Target-Resident DoS Filters," Proceedings of IE EE Security and Privacy, pp. 103-114, May 2004.
P. Ferguson, and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," RFC 2827, May 2000
Ghosh A, Wong L, Di Crescenzo G, and Talpade R, "In- Filter: predictive ingress filtering to detect spoofed IP traffic," Proceedings of Distributed Computing Systems Workshops, pp. 99-106, Jun. 2005.
Mirkovic J, and Prier G,Reiher P, "Attacking DDoS at the source," Proceedings of IEEE International Conference on Network Protocols, pp. 312-321, 2002.
Haggerty J, Qi Shi, and Merabti M, "Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking," IEEE Selected Areas in Communications, vol. 23, no. 10, pp. 1994-2002, Oct. 2005.
Tu Xu, Da Ke He, and Yu Zheng, "Detecting DDOS Attack Based on One-Way Connection Density," Proceedings of IEEE International Conference on Communication systems, pp. 1-5, Oct. 2006.
Bremler-Barr, and A,Levy, H, "Spoofing prevention method," Proceedings of IEEE INFOCOM 2005, vol. 1, pp. 536-547, Mar. 2005.
Siaterlis C, and Maglaris V, "Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics," Proceedings of IEEE Symposium on Computers and Communications, pp. 469-475, Jun. 2005.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.