[go: up one dir, main page]

Razmov, 2000 - Google Patents

Denial of service attacks and how to defend against them

Razmov, 2000

View PDF
Document ID
17112590157924730787
Author
Razmov V
Publication year
Publication venue
University of Washington

External Links

Snippet

This paper is a survey on the problem of denial-of-service (DoS) attacks and proposed ways to deal with it. We describe the nature of the problem and look for its root causes, further presenting brief insights and suggested approaches for defending against DoS. We point …
Continue reading at www.csl.mtu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Gu et al. Denial of service attacks
Mirkovic et al. A taxonomy of DDoS attack and DDoS defense mechanisms
Douligeris et al. DDoS attacks and defense mechanisms: classification and state-of-the-art
Peng et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems
Feng et al. Design and implementation of network puzzles
Durcekova et al. Sophisticated denial of service attacks aimed at application layer
Yang et al. A DoS-limiting network architecture
Abliz Internet denial of service attacks and defense mechanisms
Beitollahi et al. Analyzing well-known countermeasures against distributed denial of service attacks
US8171562B2 (en) System and methods for protecting against denial of service attacks
US20060075491A1 (en) Network overload detection and mitigation system and method
Rajkumar A survey on latest DoS attacks: classification and defense mechanisms
Mölsä Mitigating denial of service attacks: A tutorial
Jeyanthi et al. Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
Meena et al. Distributed denial of service attacks and their suggested defense remedial approaches
Safa et al. A collaborative defense mechanism against SYN flooding attacks in IP networks
Ma Mitigating denial of service attacks with password puzzles
Jayaswal et al. Internet hack back: Counter attacks as self-defense or vigilantism?
Kumar et al. An integrated approach for defending against distributed denial-of-service (DDoS) attacks
Gulihar et al. Anomaly based mitigation of volumetric ddos attack using client puzzle as proof-of-work
Ghorbani et al. Network attacks
Prasad et al. IP traceback for flooding attacks on Internet threat monitors (ITM) using Honeypots
Razmov Denial of service attacks and how to defend against them
Bocan Developments in DOS research and mitigating technologies
Haggerty et al. Beyond the perimeter: the need for early detection of denial of service attacks