Skip to main content

2011 | OriginalPaper | Buchkapitel

2. Background

verfasst von : A. B. Tickle, E. Ahmed, S. M. Bhaskar, G. Mohay, S. Panichprecha, S. V. Raghavan, B. Ravindran, D. Schmidt, S. Suriadi

Erschienen in: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Chap.​ 1, we have introduced the serious consequences that a Denial of Service (DoS) attack could pose on our society which is increasingly reliant on information and the systems used to store, process, and communicate that information. However, the DoS problem has various dimensions and definitions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Readers who are interested in the details of the taxonomy of DDoS should refer to the paper by Mirkovic and Reiher [44].
 
Literatur
2.
Zurück zum Zitat Arce, I., and E. Levy. 2003. An analysis of the slapper worm. IEEE Security & Privacy 1(1): 82–87.CrossRef Arce, I., and E. Levy. 2003. An analysis of the slapper worm. IEEE Security & Privacy 1(1): 82–87.CrossRef
5.
Zurück zum Zitat Barford, P., and V. Yegneswaran. 2006. An inside look at botnets. Malware detection, eds. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Advances in Information Security, 171–191. Berlin: Springer Science+Business Media, LLC. Barford, P., and V. Yegneswaran. 2006. An inside look at botnets. Malware detection, eds. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Advances in Information Security, 171–191. Berlin: Springer Science+Business Media, LLC.
9.
Zurück zum Zitat Bryan-Low, C. 2007. How legal codes can hinder hacker cases. The Wall Street Journal. Jan 17, p. A8. Bryan-Low, C. 2007. How legal codes can hinder hacker cases. The Wall Street Journal. Jan 17, p. A8.
14.
Zurück zum Zitat Cheswick, W.R., and S.M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional. Cheswick, W.R., and S.M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional.
15.
Zurück zum Zitat CPNI. 2008. Advice on the sockstress vulnerabilities (FICORA 193744). Advisory, Centre for the Protection of National Infrastructure. CPNI. 2008. Advice on the sockstress vulnerabilities (FICORA 193744). Advisory, Centre for the Protection of National Infrastructure.
20.
Zurück zum Zitat Garber, L. 2000. Denial-of-service attacks rip the internet. Computer 33(4): 12–17.CrossRef Garber, L. 2000. Denial-of-service attacks rip the internet. Computer 33(4): 12–17.CrossRef
25.
Zurück zum Zitat Hund, R., M. Hamann, and T. Holz. 2008. Towards next-generation botnets. In European Conference on Computer Network Defense. EC2ND 2008, 33–40. Hund, R., M. Hamann, and T. Holz. 2008. Towards next-generation botnets. In European Conference on Computer Network Defense. EC2ND 2008, 33–40.
27.
Zurück zum Zitat International Telecommunication Union. 1991. Data communication networks: Open systems interconnection (OSI); security, structure and applications–security architecture for open systems interconnection for CCIT applications. Recommendation X.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland. International Telecommunication Union. 1991. Data communication networks: Open systems interconnection (OSI); security, structure and applications–security architecture for open systems interconnection for CCIT applications. Recommendation X.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland.
28.
Zurück zum Zitat (International Telecommunication Union) ITU. 2008. Itu botnet mitigation toolkit: Background information. Technical report. (International Telecommunication Union) ITU. 2008. Itu botnet mitigation toolkit: Background information. Technical report.
29.
Zurück zum Zitat Jensen, M., N. Gruschka, and R. Herkenhöner. 2009. A survey of attacks on web services. Computer Science – R&D 24(4): 185–197. Jensen, M., N. Gruschka, and R. Herkenhöner. 2009. A survey of attacks on web services. Computer Science – R&D 24(4): 185–197.
31.
Zurück zum Zitat Kuzmanonvic, A., and E.W. Knightly. 2006. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4): 683–696.CrossRef Kuzmanonvic, A., and E.W. Knightly. 2006. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4): 683–696.CrossRef
33.
Zurück zum Zitat Lee, K., J. Kim, K.H. Kwon, Y. Han, and S. Kim. 2008. DDoS attack detection method using cluster analysis. Expert Systems with Applications 34(3): 1659–1665.CrossRef Lee, K., J. Kim, K.H. Kwon, Y. Han, and S. Kim. 2008. DDoS attack detection method using cluster analysis. Expert Systems with Applications 34(3): 1659–1665.CrossRef
34.
Zurück zum Zitat Li, Z., A. Goyal, and Y. Chen. 2008. Honeynet-based botnet scan traffic analysis. In Botnet detection: Countering the largest security threat, eds. W. Lee, C. Wang, and D. Dagon, 25–44. Berlin: Springer. Li, Z., A. Goyal, and Y. Chen. 2008. Honeynet-based botnet scan traffic analysis. In Botnet detection: Countering the largest security threat, eds. W. Lee, C. Wang, and D. Dagon, 25–44. Berlin: Springer.
36.
Zurück zum Zitat Lu, W., M. Tavallaee, and A.A. Ghorbani. 2009. Automatic discovery of botnet communities on large-scale communication networks. In ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’09), 1–10, Sydney, Australia. Lu, W., M. Tavallaee, and A.A. Ghorbani. 2009. Automatic discovery of botnet communities on large-scale communication networks. In ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’09), 1–10, Sydney, Australia.
39.
Zurück zum Zitat McPherson, D., C. Labovitz, M. Hollyman, J. Nazario, and G.R. Malan. 2008. Worldwide infrastructure security report. Technical report, Arbor Networks. McPherson, D., C. Labovitz, M. Hollyman, J. Nazario, and G.R. Malan. 2008. Worldwide infrastructure security report. Technical report, Arbor Networks.
45.
Zurück zum Zitat Mölsä, J. 2005. Mitigating denial of service attacks: A tutorial. Journal of Computer Security 13(6): 807–837. Mölsä, J. 2005. Mitigating denial of service attacks: A tutorial. Journal of Computer Security 13(6): 807–837.
48.
Zurück zum Zitat Needham, R.M. 1993. Denial of service. In The 1st ACM Conference on Computer and Communications Security, 151–153, Fairfax. Needham, R.M. 1993. Denial of service. In The 1st ACM Conference on Computer and Communications Security, 151–153, Fairfax.
50.
Zurück zum Zitat Padmanabhuni, S., V. Singh, K.M.S. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, IEEE Computer Society. Padmanabhuni, S., V. Singh, K.M.S. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, IEEE Computer Society.
54.
Zurück zum Zitat Savage, S., N. Cardwell, D. Wetherall, and T. Anderson. 1999. TCP congestion control with a misbehaving receiver. SIGCOMM Computer Communication Review 29(5): 71–78.CrossRef Savage, S., N. Cardwell, D. Wetherall, and T. Anderson. 1999. TCP congestion control with a misbehaving receiver. SIGCOMM Computer Communication Review 29(5): 71–78.CrossRef
55.
Zurück zum Zitat Sherwood, R., B. Bhattacharjee, and R. Braud 2005. Misbehaving TCP receivers can cause internet-wide congestion collapse. In CCS ’05: Proceedings of the 12th ACM Conference on Computer and Communications Security, 383–392, New York, ACM Press. Sherwood, R., B. Bhattacharjee, and R. Braud 2005. Misbehaving TCP receivers can cause internet-wide congestion collapse. In CCS ’05: Proceedings of the 12th ACM Conference on Computer and Communications Security, 383–392, New York, ACM Press.
56.
Zurück zum Zitat Smith, J. 2007. Denial of service: Prevention, modelling and detection. Ph.D. thesis, Information Security Institute, Queensland University of Technology, Brisbane, Australia. Smith, J. 2007. Denial of service: Prevention, modelling and detection. Ph.D. thesis, Information Security Institute, Queensland University of Technology, Brisbane, Australia.
60.
Zurück zum Zitat Stover, S., D. Dittrich, J. Hernandez, and S. Dietrich. 2007. Analysis of the storm and nugache trojans: P2P is here. The USENIX Magazine 32. Stover, S., D. Dittrich, J. Hernandez, and S. Dietrich. 2007. Analysis of the storm and nugache trojans: P2P is here. The USENIX Magazine 32.
61.
Zurück zum Zitat Strayer, W.T., D. Lapsely, R. Walsh, and C. Livadas. 2008. Botnet detection based on network behavior. In Botnet detection: Countering the largest security threat, eds. vol. 36 Advances in information security, 1–24. Berlin: Springer. Strayer, W.T., D. Lapsely, R. Walsh, and C. Livadas. 2008. Botnet detection based on network behavior. In Botnet detection: Countering the largest security threat, eds. vol. 36 Advances in information security, 1–24. Berlin: Springer.
65.
Zurück zum Zitat US Committee on National Security Systems. 2006. National information assurance (IA) glossary. Instruction 4009, CNSS. US Committee on National Security Systems. 2006. National information assurance (IA) glossary. Instruction 4009, CNSS.
Metadaten
Titel
Background
verfasst von
A. B. Tickle
E. Ahmed
S. M. Bhaskar
G. Mohay
S. Panichprecha
S. V. Raghavan
B. Ravindran
D. Schmidt
S. Suriadi
Copyright-Jahr
2011
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-0277-6_2

Neuer Inhalt