Abstract
Distributed denial of service attacks are often considered just a security problem. While this may be the way to view the problem with the Internet of today, perhaps new network architectures attempting to address the issue should view it as a scalability problem. In addition, they may need to approach the problem based on a rigorous foundation.
- Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, and David Dagon. Peer-to-peer botnets: Overview and case study. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets. USENIX, April 2007. Google ScholarDigital Library
- Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. Networking named content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pages 1--12. ACM Press, December 2009. Google ScholarDigital Library
- Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pages 104--113. Springer-Verlag, August 1996. Google ScholarDigital Library
- Tobias Lauinger. Security & scalability of content-centric networking. Master's thesis, Technische Universität Darmstadt and Eurécom, September 2010.Google Scholar
- Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys, 39(1), April 2007. Google ScholarDigital Library
- Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker. DDoS defense by offense. ACM Transactions on Computer Systems, 28(1), March 2010. Google ScholarDigital Library
Index Terms
- Distributed denial of service is a scalability problem
Recommendations
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
The Denial-of-Service Dance
By understanding the types of attacks available to an adversary, we can develop more effective defenses against them. A taxonomy of denial-of-service attacks based on a dance-hall metaphor is a step toward gaining such an understanding.
Securing wireless mobile nodes from distributed denial-of-service attacks
The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. The term mobile botnet refers to group of mobile ...
Comments