International Journal of Soft Computing

Year: 2009
Volume: 4
Issue: 2
Page No. 68 - 75

Analyzing Interaction Between Denial of Service (DoS) Attacks and Threats

Authors : S. Karthik , V.P. Arunachalam and T. Ravichandran

References

Cisco, 2008. Strategies to protect against distributed denial of service attacks. http://www.cisco.com/en/US/tech/tk59/technologies_white_paper09186a0080174a5b.shtml.

Ferguson, P. and D. Senie, 2000. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC Editor, United States.

Kevin, J.H. and M.W. George, 1996. TCP SYN flooding and IP spoofing attacks. http://www.securityfocus.com/advisories/939.

Kevin, J.H. and M.W. George, 2001. Trends in denial of service attack technology. http://www.docstoc.com/docs/11643510/Trends-in-Denial-of-Service-Attack-Technology.

Lippmann, R.P. and K. Robert, 1999. Computer security, technology center. Cunningham Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks.

Meadows, C., 1999. A formal framework and evaluation method for network denial of service. Proceedings of the 12th IEEE Computer Security Foundations Workshop, Jun. 28-30, Mordano, Italy, pp: 4-4.

Mirkovic, J. and P. Reiher, 2002. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev., 34: 39-53.
Direct Link  |  

Mirkovic, J., G. Prier and P. Reiher, 2002. Attacking DDoS at the source. Proceedings of 10th IEEE International Conference on Network Protocols, November 12-15, 2002, Paris, France, pp: 312-321.

Savage, S., D. Wetherall, A. Karlin and T. Anderson, 2000. Practical network support for IP traceback. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 28-September 1, 2000, Stockholm, Sweden, pp: 295-306.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved