Requirements for a general framework for response to distributed denial-of-service

被引:7
|
作者
Gresty, DW [1 ]
Shi, Q [1 ]
Merabti, M [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
来源
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2001年
关键词
D O I
10.1109/ACSAC.2001.991559
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can denial of service be removed, can it be detected and can network systems adequately respond to denial of service incidents should they become subjected to them? This paper describes some issues that make network denial of service a difficult security problem, and discusses some solutions that have been provided by the security research community. The paper then provides a classification of denial of service, the Consumer problem and the Producer problem, which forms the bulk of modern network denial of service incidents. Finally the paper proposes requirements for a framework, for the management of response to network denial of service incidents, and suggests future directions that are being developed to create the framework.
引用
收藏
页码:422 / 429
页数:8
相关论文
共 50 条
  • [31] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [32] Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
    Vanitha, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 90 - 96
  • [33] Analysis of the effects of distributed denial-of-service attacks on MPLS networks
    Genge, Bela
    Siaterlis, Christos
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (02) : 87 - 95
  • [34] A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva
    Xiao, Yang
    Sun, Guang
    Jiang, Wangdong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [35] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [36] A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive
    Zhang, Mingwei
    Li, Jun
    Wu, Jiabin
    Reiher, Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023, 2025, 568 : 3 - 24
  • [37] A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack
    Thiruvaazhi, Uloli
    Alex, M. Edington
    INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 36 - 46
  • [38] A Low-Cost Distributed Denial-of-Service Attack Architecture
    Huang, Kaifan
    Yang, Lu-Xing
    Yang, Xiaofan
    Xiang, Yong
    Tang, Yuan Yan
    IEEE ACCESS, 2020, 8 : 42111 - 42119
  • [39] Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test
    Chen, Chin-Ling
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1190 - 1194
  • [40] Distributed denial-of-service attacks against HTTP/2 services
    Adi, Erwin
    Baig, Zubair A.
    Hingston, Philip
    Lam, Chiou-Peng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 79 - 86