Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Defending wireless infrastructure against the challenge of DDoS attacks
Mobile Networks and Applications
Defending Against Denial-of-Service Attacks with Puzzle Auctions
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
E-commerce concerns: do we need to change some systems?
Enterprise information systems IV
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mitigating bandwidth-exhaustion attacks using congestion puzzles
Proceedings of the 11th ACM conference on Computer and communications security
Scalable multicast based filtering and tracing framework for defeating distributed DoS attacks
International Journal of Network Management
IEEE Transactions on Dependable and Secure Computing
Defeating DDoS attacks by fixing the incentive chain
ACM Transactions on Internet Technology (TOIT)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Evaluation of a low-rate DoS attack against iterative servers
Computer Networks: The International Journal of Computer and Telecommunications Networking
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Counteract SYN flooding using second chance packet filtering
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Packet marking based cooperative attack response service for effectively handling suspicious traffic
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Mathematical foundations for the design of a low-rate dos attack to iterative servers (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Effective control of abnormal neighbor discovery congestion on IPv6 local area network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Assessment of a vulnerability in iterative servers enabling low-rate dos attacks
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Low rate dos attack to monoprocess servers
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Hi-index | 0.00 |
Security experts generally acknowledge that the long-term solution to distributed denial of service attacks is to increase the security level of Internet computers. Attackers would then be unable to find zombie computers to control. Internet users would also have to set up globally coordinated filters to stop attacks early. However, the critical challenge in these solutions lies in identifying the incentives for the Internet's tens of millions of independent companies and individuals to cooperate on security and traffic control issues that do not appear to directly affect them. We give a brief introduction to: network weaknesses that DDoS attacks exploit; the technological futility of addressing the problem solely at the local level; potential global solutions; and why global solutions require an economic incentive framework