Public access to the Internet
Pricing in computer networks: reshaping the research agenda
ACM SIGCOMM Computer Communication Review
Responsive pricing in the Internet
Internet economics
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The economics of network management
Communications of the ACM
Dynamic behavior of differential pricing and quality of service options for the internet
Decision Support Systems - Special issue on information and computational economics
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Using router stamping to identify the source of IP packets
Proceedings of the 7th ACM conference on Computer and communications security
Distributed Denial of Service Attacks and the Zombie Ant Effect
IT Professional
Defeating Distributed Denial of Service Attacks
IT Professional
Should Flat-Rate Internet Pricing Continue?
IT Professional
Internet growth: is there a "Moore's law" for data traffic?
Handbook of massive data sets
Analyzing Distributed Denial of Service Tools: The Shaft Case
LISA '00 Proceedings of the 14th USENIX conference on System administration
Providing Internet access: what we learn from INDEX
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a Web site in order to paralyze its normal activity. The additional parameter in Distributed Denial of Service (DdoS) attacks is the distributing strategy. It means that DDoS attacks do not come from a single computer but stem from all accessible channels and servers. Consequences are multiple, ranging from system errors, temporary inability to access the Web site for normal users to challenging the actual reliability of the Internet. Despite this, Internet users show carelessness. The explanation lies in the specificities of DDoS attacks. We explore possibilities to raise users' awareness about the actual amplitude of problems caused by DDoS attacks. We suggest a careful examination of Internet pricing mechanisms and switching from flat to usage-constraining pricing schemes.