Gu et al., 2007 - Google Patents
Denial of service attacksGu et al., 2007
View PDF- Document ID
- 11034208863241086813
- Author
- Gu Q
- Liu P
- Publication year
- Publication venue
- Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications
External Links
Snippet
Denial of service (DoS) attacks have become a major threat to current computer networks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS attacks and major defense technologies in the Internet and wireless networks. In …
- 238000000034 method 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gu et al. | Denial of service attacks | |
Abliz | Internet denial of service attacks and defense mechanisms | |
Handley et al. | Internet denial-of-service considerations | |
Anderson et al. | Preventing Internet denial-of-service with capabilities | |
Gupta et al. | Distributed denial of service prevention techniques | |
Ryba et al. | Amplification and DRDoS attack defense--a survey and new perspectives | |
Peng et al. | Survey of network-based defense mechanisms countering the DoS and DDoS problems | |
Mirkovic et al. | A taxonomy of DDoS attack and DDoS defense mechanisms | |
Beitollahi et al. | Analyzing well-known countermeasures against distributed denial of service attacks | |
Douligeris et al. | DDoS attacks and defense mechanisms: classification and state-of-the-art | |
Gupta et al. | Defending against distributed denial of service attacks: issues and challenges | |
Srivastava et al. | A recent survey on DDoS attacks and defense mechanisms | |
Geva et al. | Bandwidth distributed denial of service: Attacks and defenses | |
US20050050364A1 (en) | System and methods for protecting against denial of service attacks | |
Rajkumar | A survey on latest DoS attacks: classification and defense mechanisms | |
Raghavan et al. | An investigation into the detection and mitigation of denial of service (dos) attacks: critical information infrastructure protection | |
Li et al. | Bijack: Breaking bitcoin network with tcp vulnerabilities | |
Singh et al. | Denial of service attack in wireless data network: A survey | |
Meena et al. | Distributed denial of service attacks and their suggested defense remedial approaches | |
Ansa et al. | A DOS-resilient design for delay tolerant networks | |
Ghorbani et al. | Network attacks | |
Fowler et al. | Impact of denial of service solutions on network quality of service | |
Fallah et al. | TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks | |
Shrivastava et al. | The detection & defense of DoS & DDos attack: a technical overview | |
Soomro et al. | Denial of service attacks in wireless ad hoc networks |