[go: up one dir, main page]

Guha et al., 2008 - Google Patents

ShutUp: End-to-end containment of unwanted traffic

Guha et al., 2008

View PDF
Document ID
13746939954178525346
Author
Guha S
Taft N
Publication year

External Links

Snippet

While the majority of Denial-of-Service (DoS) defense proposals assume a purely infrastructure-based architecture, some recent proposals suggest that the attacking endhost may be enlisted as part of the solution, through tamper-proof software, network-imposed …
Continue reading at ecommons.cornell.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Birkinshaw et al. Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks
Dayal et al. Research trends in security and DDoS in SDN
Weaver et al. Very fast containment of scanning worms, revisited
Mirkovic et al. A taxonomy of DDoS attack and DDoS defense mechanisms
Chao-Yang DOS attack analysis and study of new measures to prevent
KR101042291B1 (en) DDoS detection / blocking system for DDoS attack and its method
Jeyanthi et al. Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
Boppana et al. Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks
Safa et al. A collaborative defense mechanism against SYN flooding attacks in IP networks
Nagesh et al. A survey on denial of service attacks and preclusions
Ghorbani et al. Network attacks
Devi et al. Cloud-based DDoS attack detection and defence system using statistical approach
Alosaimi et al. Mitigation of distributed denial of service attacks in the cloud
Kassing et al. Order P4-66: Characterizing and mitigating surreptitious programmable network device exploitation
Djalaliev et al. Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks
AT&T 0.8-21shots.eps
Guha et al. ShutUp: End-to-end containment of unwanted traffic
Khirwadkar Defense against network attacks using game theory
Singhal et al. Design and Development of Anti-DoS/DDoS Attacks Framework Using IPtables
Vadehra et al. Impact evaluation of distributed denial of service attacks using ns2
Kuldeep et al. Enhancing Network Security by implementing preventive mechanism using GNS3
Mitrokotsa et al. Denial-of-service attacks
Hashmi et al. Intrusion Prevention System based Defence Techniques to manage DDoS Attacks
Ling Adaptive Response System for Distributed Denial-of-Service Attacks
Nakato Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent