Guha et al., 2008 - Google Patents
ShutUp: End-to-end containment of unwanted trafficGuha et al., 2008
View PDF- Document ID
- 13746939954178525346
- Author
- Guha S
- Taft N
- Publication year
External Links
Snippet
While the majority of Denial-of-Service (DoS) defense proposals assume a purely infrastructure-based architecture, some recent proposals suggest that the attacking endhost may be enlisted as part of the solution, through tamper-proof software, network-imposed …
- 230000002155 anti-virotic 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Birkinshaw et al. | Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Weaver et al. | Very fast containment of scanning worms, revisited | |
Mirkovic et al. | A taxonomy of DDoS attack and DDoS defense mechanisms | |
Chao-Yang | DOS attack analysis and study of new measures to prevent | |
KR101042291B1 (en) | DDoS detection / blocking system for DDoS attack and its method | |
Jeyanthi et al. | Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment | |
Boppana et al. | Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks | |
Safa et al. | A collaborative defense mechanism against SYN flooding attacks in IP networks | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Ghorbani et al. | Network attacks | |
Devi et al. | Cloud-based DDoS attack detection and defence system using statistical approach | |
Alosaimi et al. | Mitigation of distributed denial of service attacks in the cloud | |
Kassing et al. | Order P4-66: Characterizing and mitigating surreptitious programmable network device exploitation | |
Djalaliev et al. | Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks | |
AT&T | 0.8-21shots.eps | |
Guha et al. | ShutUp: End-to-end containment of unwanted traffic | |
Khirwadkar | Defense against network attacks using game theory | |
Singhal et al. | Design and Development of Anti-DoS/DDoS Attacks Framework Using IPtables | |
Vadehra et al. | Impact evaluation of distributed denial of service attacks using ns2 | |
Kuldeep et al. | Enhancing Network Security by implementing preventive mechanism using GNS3 | |
Mitrokotsa et al. | Denial-of-service attacks | |
Hashmi et al. | Intrusion Prevention System based Defence Techniques to manage DDoS Attacks | |
Ling | Adaptive Response System for Distributed Denial-of-Service Attacks | |
Nakato | Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent |