Experiences with a continuous network tracing infrastructure
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
Denial-of-Service Attack-Detection Techniques
IEEE Internet Computing
Denial of Service against the Domain Name System
IEEE Security and Privacy
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics
Journal of Network and Systems Management
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Analyzing large DDoS attacks using multiple data sources
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Defeating DDoS attacks by fixing the incentive chain
ACM Transactions on Internet Technology (TOIT)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
A user-centric metric for denial-of-service measurement
ecs'07 Experimental computer science on Experimental computer science
Implementing and testing dynamic timeout adjustment as a dos counter-measure
Proceedings of the 2007 ACM workshop on Quality of protection
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Logging based IP Traceback in switched ethernets
Proceedings of the 1st European Workshop on System Security
BotTorrent: misusing BitTorrent to launch DDoS attacks
SRUTI'07 Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
A situatedness-based knowledge plane for autonomic networking
International Journal of Network Management
Generic denial of service prevention through a logical fibering algorithm
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Mitigating distributed denial-of-service attacks using network connection control charts
Proceedings of the 2nd international conference on Scalable information systems
Two layer Denial of Service prevention on SIP VoIP infrastructures
Computer Communications
Denial of service detection and analysis using idiotypic networks paradigm
Proceedings of the 10th annual conference on Genetic and evolutionary computation
DIWeDa - Detecting Intrusions in Web Databases
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
On Some Method for Intrusion Detection Used by the Multi-agent Monitoring System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
High performance traffic shaping for DDoS mitigation
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Agent-based modeling and simulation of network softbots' competition
Proceedings of the 2006 conference on Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
A DoS-resilient information system for dynamic data management
Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures
Mathematical model for low-rate DoS attacks against application servers
IEEE Transactions on Information Forensics and Security
A bidirectional-based DDoS detection mechanism
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
A multi-agent system for computer network security monitoring
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Scheme of defending against DDoS attacks in large-scale ISP networks
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Defense techniques for low-rate DoS attacks against application servers
Computer Networks: The International Journal of Computer and Telecommunications Networking
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Launching distributed denial of service attacks by network protocol exploitation
AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
Simulation of internet DDoS attacks and defense
ISC'06 Proceedings of the 9th international conference on Information Security
A real-time and reliable approach to detecting traffic variations at abnormally high and low rates
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Janus: a two-sided analytical model for multi-stage coordinated attacks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Detecting DNS amplification attacks
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
LoRDAS: a low-rate dos attack against application servers
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
A multilayer overlay network architecture for enhancing IP services availability against dos
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Queuing algorithms performance against buffer size and attack intensities in DDOS attacks
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Agent-based simulation of cooperative defence against botnets
Concurrency and Computation: Practice & Experience
A denial-of-service resistant DHT
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Queue management as a DoS counter-measure?
ISC'07 Proceedings of the 10th international conference on Information Security
Detecting latent attack behavior from aggregated Web traffic
Computer Communications
IRIS: a robust information system against insider dos-attacks
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Survey and taxonomy of botnet research through life-cycle
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do?Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack.Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplicesThe authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.