The denial-of-service dance

被引:4
|
作者
Campbell, PL [1 ]
机构
[1] Sandia Natl Labs, Livermore, CA 94550 USA
关键词
Categorized attacks - Denial-of-service (DoS) - Hardware connection - Remote attacks;
D O I
10.1109/MSP.2005.162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The attack on computer security include attack on confidentiality, integrity and availability. Confidentiality and integrity can be attacked by breaking cryptography but attack on availability can be made with mounting a denial of service attack by flooding a victim with input. Effective defense mechanism can be developed if the types of attack available to an adversary is known. A denial-of-service attack based on dance hall metaphor, created by David Gresty and his colleague at Liverpool John Moore's University, is a step toward such an understanding. They have created denial-of-service matrix and categorized attacks in two types, Local attacks such as power cut, unplugging or improper hardware connection and Remote attacks.
引用
收藏
页码:34 / 40
页数:7
相关论文
共 50 条
  • [1] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [2] Denial-of-service attacks
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [3] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [4] Detection of Denial-of-service Attacks
    Anh Quang Tran
    计算机工程, 2002, (S1) : 86 - 91
  • [5] A denial-of-service resistant DHT
    Awerbuch, Baruch
    Scheideler, Christian
    DISTRIBUTED COMPUTING, PROCEEDINGS, 2007, 4731 : 33 - +
  • [6] A Denial-of-Service Resistant DHT
    Awerbuch, Baruch
    Scheideler, Christian
    PODC'07: PROCEEDINGS OF THE 26TH ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2007, : 370 - 371
  • [7] Denial-of-Service in Automation Systems
    Granzer, Wolfgang
    Reinisch, Christian
    Kastner, Wolfgang
    2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 468 - 471
  • [8] Denial-of-Service Attacks to UMTS
    Bertino, Elisa
    COMPUTER, 2015, 48 (02) : 6 - 6
  • [9] BDoS: Blockchain Denial-of-Service
    Mirkin, Michael
    Ji, Yan
    Pang, Jonathan
    Klages-Mundt, Ariah
    Eyal, Ittay
    Juels, Ari
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 601 - 619
  • [10] Denial-of-Service Attacks on LoRaWAN
    van Es, Eef
    Vranken, Harald
    Hommersom, Arjen
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,