Mölsä, 2005 - Google Patents
Mitigating denial of service attacks: A tutorialMölsä, 2005
View PDF- Document ID
- 14342953826804206912
- Author
- Mölsä J
- Publication year
- Publication venue
- Journal of computer security
External Links
Snippet
This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and …
- 230000000116 mitigating 0 title abstract description 51
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Long et al. | Trends in denial of service attack technology | |
| Gupta et al. | Defending against distributed denial of service attacks: issues and challenges | |
| Mölsä | Mitigating denial of service attacks: A tutorial | |
| Mirkovic et al. | A taxonomy of DDoS attack and DDoS defense mechanisms | |
| Geva et al. | Bandwidth distributed denial of service: Attacks and defenses | |
| Wang et al. | Honeypot detection in advanced botnet attacks | |
| Douligeris et al. | DDoS attacks and defense mechanisms: classification and state-of-the-art | |
| Beitollahi et al. | Analyzing well-known countermeasures against distributed denial of service attacks | |
| Gu et al. | Denial of service attacks | |
| Specht et al. | Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. | |
| Srivastava et al. | A recent survey on DDoS attacks and defense mechanisms | |
| Obaid et al. | DoS and DDoS attacks at OSI layers | |
| Fenil et al. | Survey on DDoS defense mechanisms | |
| Schneider | The state of network security | |
| Raghavan et al. | An investigation into the detection and mitigation of denial of service (dos) attacks: critical information infrastructure protection | |
| Nayak et al. | Depth analysis on DoS & DDoS attacks | |
| Rahman et al. | A novel cloud computing security model to detect and prevent DoS and DDoS attack | |
| Poongothai et al. | Simulation and analysis of DDoS attacks | |
| Keshariya et al. | DDoS defense mechanisms: A new taxonomy | |
| Mirković | D-WARD: DDoS network attack recognition and defence | |
| Ghorbani et al. | Network attacks | |
| Chen et al. | An inline detection and prevention framework for distributed denial of service attacks | |
| Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
| Göldi et al. | Scan detection based identification of worm-infected hosts | |
| Desai et al. | Denial of service attack defense techniques |