2003
DOI: 10.2172/820887
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial-of-Service Characterization

Abstract: Distributed denial of service (DoS) attacks on cyber-resources are complex problems that are difficult to completely define, characterize, and mitigate. We recognize the process-nature of DoS attacks and view them from multiple perspectives. Identification of opportunities for mitigation and further research may result from this attempt to characterize the DoS problem space. We examine DoS attacks from the point of view of 1) a high-level that establishes common terminology and a framework for discussing the D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2004
2004
2008
2008

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 17 publications
(10 reference statements)
0
3
0
Order By: Relevance
“…DoS attacks are classified based on the services that an adversary makes unavailable to legitimate users. A few examples include preventing legitimate network traffic, preventing access to services for a group or individuals [32].…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…DoS attacks are classified based on the services that an adversary makes unavailable to legitimate users. A few examples include preventing legitimate network traffic, preventing access to services for a group or individuals [32].…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…Important:{1, 3,5,6,8,19,[23][24][25][26][27][28]32,33,35,36,[38][39][40][41]7,9,11,14,17,20,22,29,30,34,37> Unimportant: (4,12,13,15,16,18,19,21,3) Unimportant: (7,8,9,11,13,22,27,28,30,31,35,36,37, 40,41) Table 4. SVM detection efficacy for dos using different features obtained from svdf ranking…”
Section: Ranking the Significance Of Inputsmentioning
confidence: 99%
“…Efforts on how to define and characterize denial of service attacks through a collection of different perspectives such as bandwidth, process information, system infomation, user information and 1P address is being proposed by several researchers [2,3,9]. Using the defmed characteristics a few signature-based and anomaly based detection techniques are proposed [5,12,13,14,].…”
Section: Introductionmentioning
confidence: 99%