Combinatorial optimization: algorithms and complexity
Combinatorial optimization: algorithms and complexity
On routes and multicast trees in the Internet
ACM SIGCOMM Computer Communication Review
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Resource containers: a new facility for resource management in server systems
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Defending against denial of service attacks in Scout
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
An Analysis of Internet Inter-Domain Topology and Route Stability
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
BRITE: A Flexible Generator of Internet Topologies
BRITE: A Flexible Generator of Internet Topologies
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
Tradeoffs in probabilistic packet marking for IP traceback
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Lightweight network support for scalable end-to-end services
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
On the Spectrum and Structure of Internet Topology Graphs
IICS '02 Proceedings of the Second International Workshop on Innovative Internet Computing Systems
Providing Process Origin Information to Aid in Network Traceback
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Adjusted Probabilistic Packet Marking for IP Traceback
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
Design and Implementation of FPGA Circuits for High Speed Network Monitors
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
A Path Information Caching and Aggregation Approach to Traffic Source Identification
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
IP Traceback: A New Denial-of-Service Deterrent?
IEEE Security and Privacy
A framework for classifying denial of service attacks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Scaling properties of the Internet graph
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Power laws and the AS-level internet topology
IEEE/ACM Transactions on Networking (TON)
Using graphic turing tests to counter automated DDoS attacks against web servers
Proceedings of the 10th ACM conference on Computer and communications security
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks
Journal of Network and Systems Management
Preventing Internet denial-of-service with capabilities
ACM SIGCOMM Computer Communication Review
Measuring ISP topologies with rocketfuel
IEEE/ACM Transactions on Networking (TON)
On the power-law random graph model of massive data networks
Performance Evaluation - Internet performance symposium (IPS 2002)
Alliance formation for DDoS defense
Proceedings of the 2003 workshop on New security paradigms
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards capturing representative AS-level Internet topologies
Computer Networks: The International Journal of Computer and Telecommunications Networking
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
The session token protocol for forensics and traceback
ACM Transactions on Information and System Security (TISSEC)
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
Journal of Systems and Software - Special issue: Performance modeling and analysis of computer systems and networks
On the scaling of congestion in the internet graph
ACM SIGCOMM Computer Communication Review
Scalable multicast based filtering and tracing framework for defeating distributed DoS attacks
International Journal of Network Management
Change-Point Monitoring for the Detection of DoS Attacks
IEEE Transactions on Dependable and Secure Computing
Collecting the internet AS-level topology
ACM SIGCOMM Computer Communication Review
Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Trade-offs in probabilistic packet marking for IP traceback
Journal of the ACM (JACM)
Providing process origin information to aid in computer forensic investigations
Journal of Computer Security
Perimeter-Based Defense against High Bandwidth DDoS Attacks
IEEE Transactions on Parallel and Distributed Systems
Flash crowd mitigation via adaptive admission control based on application-level observations
ACM Transactions on Internet Technology (TOIT)
Trust and accountability issues in scalable invalidation-based web cache consistency
ACM SIGOPS Operating Systems Review
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
IEEE Security and Privacy
The internet AS-level topology: three data sources and one definitive metric
ACM SIGCOMM Computer Communication Review
IP Easy-pass: a light-weight network-edge resource access control
IEEE/ACM Transactions on Networking (TON)
CAPTRA: coordinated packet traceback
Proceedings of the 5th international conference on Information processing in sensor networks
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics
Journal of Network and Systems Management
IEEE Transactions on Dependable and Secure Computing
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks
IEEE Transactions on Parallel and Distributed Systems
Quality of service provisioning for composable routing elements
Computer Networks: The International Journal of Computer and Telecommunications Networking
Protecting TCP services from denial of service attacks
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
One step ahead to multisensor data fusion for DDoS detection
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Incremental deployment strategies for router-assisted reliable multicast
IEEE/ACM Transactions on Networking (TON)
A practical and robust inter-domain marking scheme for IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic probabilistic packet marking for efficient IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Stateful DDoS attacks and targeted filtering
Journal of Network and Computer Applications
Provider-based deterministic packet marking against distributed DoS attacks
Journal of Network and Computer Applications
Enhanced Internet security by a distributed traffic control service based on traffic ownership
Journal of Network and Computer Applications
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Defense against spoofed IP traffic using hop-count filtering
IEEE/ACM Transactions on Networking (TON)
On deterministic packet marking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient and secure source authentication with packet passports
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
IEEE Transactions on Parallel and Distributed Systems
Building Reputations for Internet Clients
Electronic Notes in Theoretical Computer Science (ENTCS)
AID: A global anti-DoS service
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust and efficient detection of DDoS attacks for large-scale internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Learning the valid incoming direction of IP packets
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the hardness of optimization in power-law graphs
Theoretical Computer Science
Protecting information infrastructure from DDoS attacks by MADF
International Journal of High Performance Computing and Networking
A general model of probabilistic packet marking for IP traceback
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Passport: secure and adoptable source authentication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Basic properties of the IPv6 AS-level topology
ACM SIGMETRICS Performance Evaluation Review
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Expert Systems with Applications: An International Journal
Detecting distributed network traffic anomaly with network-wide correlation analysis
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
IEEE/ACM Transactions on Networking (TON)
On the state of IP spoofing defense
ACM Transactions on Internet Technology (TOIT)
Detection of DDoS attack and defense against IP spoofing
Proceedings of the International Conference on Advances in Computing, Communication and Control
INFORMS Journal on Computing
A decision support system for constructing an alert classification model
Expert Systems with Applications: An International Journal
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Comparing Trade-off Based Models of the Internet
Fundamenta Informaticae
Journal of Systems and Software
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Request diversion: a novel mechanism to counter P2P based DDoS attacks
International Journal of Internet Protocol Technology
Toward sound-assisted intrusion detection systems
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
JUST-google: a search engine-based defense against botnet-based DDoS attacks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
The dark side of the Internet: Attacks, costs and responses
Information Systems
An effective defense mechanism against DoS/DDoS attacks in flow-based routers
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A systematic framework for unearthing the missing links: measurements and impact
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
dfence: transparent network-based denial of service mitigation
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Analyzing network behaviors with knowledge acquisition and data warehousing
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Simulation of internet DDoS attacks and defense
ISC'06 Proceedings of the 9th international conference on Information Security
Intelligent DDoS packet filtering in high-speed networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
AAIM'06 Proceedings of the Second international conference on Algorithmic Aspects in Information and Management
A novel architecture for detecting and defending against flooding-based DDoS attacks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A cost-optimized detection system location scheme for DDoS attack
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Attack resiliency of network topologies
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Safeguard information infrastructure against DDoS attacks: experiments and modeling
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Enable a trustworthy network by source address spoofing prevention routers: a formal description
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A distributed network architecture for robust internet voting systems
EGOV'05 Proceedings of the 4th international conference on Electronic Government
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
LIPS: lightweight internet permit system for stopping unwanted packets
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
DDoS defense mechanisms: a new taxonomy
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
LOT: A Defense Against IP Spoofing and Flooding Attacks
ACM Transactions on Information and System Security (TISSEC)
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
Review: A critical look at power law modelling of the Internet
Computer Communications
Joining the Dots: Joining the dots
Network Security
A hybrid defense mechanism for DDoS attacks using cluster analysis in MANET
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
An incrementally deployable path address scheme
Journal of Parallel and Distributed Computing
Comparing Trade-off Based Models of the Internet
Fundamenta Informaticae
Deep packet inspection tools and techniques in commodity platforms: Challenges and trends
Journal of Network and Computer Applications
On the hardness of optimization in power law graphs
COCOON'07 Proceedings of the 13th annual international conference on Computing and Combinatorics
VASE: Filtering IP spoofing traffic with agility
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the discovery of critical links and nodes for assessing network vulnerability
IEEE/ACM Transactions on Networking (TON)
Approximability of the vertex cover problem in power-law graphs
Theoretical Computer Science
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology.The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching their targets in the first place. The IP flows that cannot be proactively curtailed are extremely sparse so that their origin can be localized---i.e., IP traceback---to within a small, constant number of candidate sites. We show that the two proactive and reactive performance effects can be achieved by implementing route-based filtering on less than 20% of Internet autonomous system (AS) sites. Second, we show that the two complementary performance measures are dependent on the properties of the underlying AS graph. In particular, we show that the power-law structure of Internet AS topology leads to connectivity properties which are crucial in facilitating the observed performance effects.