A Scheme of Resource Reallocation and Server Replication against DoS Attacks |
Min, Byoung-Joon
(인천대학교 컴퓨터공학과)
Kim, Sung-Ki (인천대학교 대학원 컴퓨터공학과) Na, Yong-Hi (인천대학교 대학원 컴퓨터공학과) Lee, Ho-Jae (한국정보보호진흥원) Choi, Joong-Sup (한국정보보호진흥원) Kim, Hong-Geun (한국정보보호진흥원) |
1 | Brian Randell, 'Dependability-Unifying Concept,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998 DOI |
2 | V. Stavridou, 'Intrusion Tolerant Software Architectures,' DARPA Information Survivability Conference & EXposition, 2001 DOI |
3 | Working Paper, 'The European Dependability Initiative,' Dec., 2000 |
4 | Marc Wilikens, et al., 'Defining the European Dependability Initiative,' May, 1998 |
5 | National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 'Securing the U.S Defence Information Infrastructures : A Proposed Approach,' 1998 |
6 | Matti A. Hiltunen et al., 'Survivability through Customization and Adaptability : The Cactus Approach', DARPA Information Survivability Conference & EXposition, 2000 DOI |
7 | Wang, F. et al, 'SITAR : A Scalable Intrusion-Tolerant Architecture for Distributed Services,' DARPA Information Survivability Conference & EXposition, 2001 DOI |
8 | Marshall Pease, Robert Shostak, Leslie Lamport, 'Reaching Agreement in the Presence of Faults', Journal of the ACM, 27/2, pp.228-234, 1980 DOI |
9 | Sun Microsystems, Sun's tcp syn flooding solutions, http://ciac.llnl.gov/ciac/bulletins/h-02.html |
10 | Reynolds, J. et al., 'The Design and Implementation of an Intrusion Tolerant System', Proc. of Int'l Conference on Dependable Systems and Networks, 2002 |