Requirements for a general framework for response to distributed denial-of-service

被引:7
|
作者
Gresty, DW [1 ]
Shi, Q [1 ]
Merabti, M [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
来源
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2001年
关键词
D O I
10.1109/ACSAC.2001.991559
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can denial of service be removed, can it be detected and can network systems adequately respond to denial of service incidents should they become subjected to them? This paper describes some issues that make network denial of service a difficult security problem, and discusses some solutions that have been provided by the security research community. The paper then provides a classification of denial of service, the Consumer problem and the Producer problem, which forms the bulk of modern network denial of service incidents. Finally the paper proposes requirements for a framework, for the management of response to network denial of service incidents, and suggests future directions that are being developed to create the framework.
引用
收藏
页码:422 / 429
页数:8
相关论文
共 50 条
  • [1] Adaptive Response System for Distributed Denial-of-Service Attacks
    Thing, Vrizlynn L. L.
    Sloman, Morris
    Dulay, Naranker
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 809 - 814
  • [2] Distributed Denial-of-Service Prediction on IoT Framework by Learning Techniques
    Dwivedi, Shubhra
    Vardhan, Manu
    Tripathi, Sarsij
    OPEN COMPUTER SCIENCE, 2020, 10 (01): : 220 - 230
  • [3] A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
    Lam, Ho-Yu
    Li, Chi-Pan
    Chanson, Samuel T.
    Yeung, Dit-Yan
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2165 - 2170
  • [4] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [5] Response to distributed denial-of-service attack using active technology
    Kim, HJ
    Na, JC
    Sohn, SW
    Proceedings of the Eighth IASTED International Conference on Internet and Multimedia Systems and Applications, 2004, : 244 - 248
  • [6] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [7] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [8] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [9] Sophistication in distributed denial-of-service attacks on the Internet
    Kumar, VA
    CURRENT SCIENCE, 2004, 87 (07): : 885 - 888
  • [10] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501