TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Efficient fair queueing using deficit round robin
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Computer Networks and ISDN Systems
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Modeling the performance of HTTP over several transport protocols
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Defending against denial of service attacks in Scout
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Using router stamping to identify the source of IP packets
Proceedings of the 7th ACM conference on Computer and communications security
Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Practical Cryptography for Data Internetworks
Practical Cryptography for Data Internetworks
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
An Empirical Model of HTTP Network Traffic
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
A Behavioral Model of Web Traffic
ICNP '99 Proceedings of the Seventh Annual International Conference on Network Protocols
COCA: A Secure Distributed On-line Certification Authority
COCA: A Secure Distributed On-line Certification Authority
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
MULTOPS: a data-structure for bandwidth attack detection
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks
Future Generation Computer Systems
IEEE/ACM Transactions on Networking (TON)
Empirical Models of TCP and UDP End-User Network Traffic from NETI@home Data Analysis
Proceedings of the 20th Workshop on Principles of Advanced and Distributed Simulation
Protecting TCP services from denial of service attacks
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Stateful DDoS attacks and targeted filtering
Journal of Network and Computer Applications
An edge-to-edge filtering architecture against DoS
ACM SIGCOMM Computer Communication Review
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
IEEE Transactions on Parallel and Distributed Systems
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
DDoS attack detection method using cluster analysis
Expert Systems with Applications: An International Journal
Detection workload in a dynamic grid-based intrusion detection environment
Journal of Parallel and Distributed Computing
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
ACM Transactions on the Web (TWEB)
IEEE/ACM Transactions on Networking (TON)
A decision support system for constructing an alert classification model
Expert Systems with Applications: An International Journal
Adaptive response system for distributed denial-of-service attacks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Towards behavioral control in multi-player network games
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks
Future Generation Computer Systems
Protecting SIP against very large flooding DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security analysis of enterprise network based on stochastic game nets model
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Dynamic information-based scalable hashing on a cluster of web cache servers
Concurrency and Computation: Practice & Experience
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Towards a bayesian network game framework for evaluating DDoS attacks and defense
Proceedings of the 2012 ACM conference on Computer and communications security
Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets
Security and Communication Networks
DDoS avoidance strategy for service availability
Cluster Computing
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 14.98 |
The recent tide of Distributed Denial of Service (DDoS) attacks against high-profile web sites demonstrate how devastating DDoS attacks are and how defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect the availability of web services during severe DDoS attacks. The basic idea behind our system is to isolate and protect legitimate traffic from a huge volume of DDoS traffic when an attack occurs. Traffic that needs to be protected can be recognized and protected using efficient cryptographic techniques. Therefore, by provisioning adequate resource (e.g., bandwidth) to legitimate traffic separated by this process, we are able to provide adequate service to a large percentage of clients during DDoS attacks. The worst-case performance (effectiveness) of the system is evaluated based on a novel game theoretical framework, which characterizes the natural adversarial relationship between a DDoS adversary and the proposed system. We also conduct a simulation study to verify a key assumption used in the game-theoretical analysis and to demonstrate the system dynamics during an attack.