+

Mölsä, 2005 - Google Patents

Mitigating denial of service attacks: A tutorial

Mölsä, 2005

View PDF
Document ID
14342953826804206912
Author
Mölsä J
Publication year
Publication venue
Journal of computer security

External Links

Snippet

This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and …
Continue reading at aaltodoc.aalto.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Long et al. Trends in denial of service attack technology
Gupta et al. Defending against distributed denial of service attacks: issues and challenges
Mölsä Mitigating denial of service attacks: A tutorial
Mirkovic et al. A taxonomy of DDoS attack and DDoS defense mechanisms
Geva et al. Bandwidth distributed denial of service: Attacks and defenses
Wang et al. Honeypot detection in advanced botnet attacks
Douligeris et al. DDoS attacks and defense mechanisms: classification and state-of-the-art
Beitollahi et al. Analyzing well-known countermeasures against distributed denial of service attacks
Gu et al. Denial of service attacks
Specht et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures.
Srivastava et al. A recent survey on DDoS attacks and defense mechanisms
Obaid et al. DoS and DDoS attacks at OSI layers
Fenil et al. Survey on DDoS defense mechanisms
Schneider The state of network security
Raghavan et al. An investigation into the detection and mitigation of denial of service (dos) attacks: critical information infrastructure protection
Nayak et al. Depth analysis on DoS & DDoS attacks
Rahman et al. A novel cloud computing security model to detect and prevent DoS and DDoS attack
Poongothai et al. Simulation and analysis of DDoS attacks
Keshariya et al. DDoS defense mechanisms: A new taxonomy
Mirković D-WARD: DDoS network attack recognition and defence
Ghorbani et al. Network attacks
Chen et al. An inline detection and prevention framework for distributed denial of service attacks
Jadidoleslamy Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Göldi et al. Scan detection based identification of worm-infected hosts
Desai et al. Denial of service attack defense techniques
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载