A Scheme of Distributed Network Security Management against DDoS Attacks |
Kim Sung-Ki
(Dept. of Computer Science & Eng. Univ. of Incheon)
Yoo Seung-Hwan (Dept. of Computer Science & Eng. Univ. of Incheon) Kim Moon-Chan (Dept. of Computer Science & Eng. Univ. of Incheon) Min Byoung-Joon (Dept. of Computer Science & Eng. Univ. of Incheon) |
1 | Dan Schnackenberg, Kelly Djahandari, Dan Sterne, 'Infrastructure for Intrusion Detection and Response,' DARPA Information Survivability Conference and Exposition, DISCEX 2000, Jan., 2000 DOI |
2 | Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred. 'Statistical Approaches to DDoS Attack Detection and Response,' DISCEX 2003, p. 303, DARPA Information Survivability Conference and Exposition - Volume I, 2003 |
3 | 'Linux Advanced Routing and Traffic Control HOWTO', http://www.lartc.org/lartc.html |
4 | Spread Toolkit, 'http://www.spread.org' |
5 | David L. Tennenhouse, J. Smith, W. Sincoskie, D. Wetherall, G. Minden, 'A Survey of Active Network Research', In IEEE Communications Magazine, 1997 DOI ScienceOn |
6 | M. E. J. Newman, 'Power laws, Pareto distri-butions and Zipf's law', International Journal of Contemporary Physics 46, p. 323-351, 2005 DOI ScienceOn |
7 | Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson, 'Practical network support for IP traceback', In Proceedings of the ACM SIGCOMM Conference, pages DOI |
8 | Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 'On power-law relationships of the internet topology', In SIGCOMM, p. 251 - 262, 1999 DOI |
9 | Robert Stone, 'Centertrack: An IP overlay network for tracking DoS floods', In Proceedings of the USENIX Security Symposium, p. 199-212, Denver, CO, USA, July 2000. USENIX |
10 | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker, 'Controlling high bandwidth aggregates in the network', In ACM ComputerCommunication Review, July 2001 DOI |
11 | Steven Bellovin, 'ICMP traceback messages', Work in Progress: draft-bellovin-itrace-00.txt |
12 | Haining Wang, Danlu Zhang, and Kang Shin. 'Detecting SYN flooding attacks', In Proceedings of the IEEE Infocom DOI |
13 | Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker. 'Controlling high bandwidth aggregates in the network', In ACM ComputerCommunication Review, July 2001 DOI |
14 | Dan Schnackenberg, Harley Holiday, et al., 'Cooperative Intrusion Traceback and Response Architecture (CITRA),', DISCEX 2001, June, 2001 DOI |
15 | Dan Stenrne, et al., 'Active Network Based DDoS Defense', Proceedings of the DARPA Active Networks Conference and Exposition (DANCE.02), p. 193, May, 2002 |
16 | Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. 'Practical network support for IP traceback', In Proceedings of the ACM SIGCOMM Conference, pages 295-306, Stockholm, Sweeden, August 2000. ACM DOI |
17 | Peter Mell, 'An Overview of Issues in Testing Intrusion Detection Systems', NIST Interagency Reprots 7007, 2003 |