2008 Seventh IEEE International Symposium on Network Computing and Applications 2008
DOI: 10.1109/nca.2008.23
|View full text |Cite
|
Sign up to set email alerts
|

FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks

Abstract: Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS attack packets. Unfortunately these techniques that filter DoS traffic by looking at known attack patterns or statistical anomalies in the traffic patterns can be defeated by changing the attack patterns and masking the anomalies that are sought by the filter. Hence, detecting DoS traffic is one of the main challenges for filtering techn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
16
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 18 publications
(20 reference statements)
1
16
0
Order By: Relevance
“…Several variations of SOS have been proposed in literature [28,29,20,21,6,5]. [28] extends its functionality to defend against botnets using CAPTCHA [32], while [29] introduces an architecture for enhancing service availability build on multi-path and stateless tokens.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Several variations of SOS have been proposed in literature [28,29,20,21,6,5]. [28] extends its functionality to defend against botnets using CAPTCHA [32], while [29] introduces an architecture for enhancing service availability build on multi-path and stateless tokens.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, this solution allows communication only among confirmed entities; meaning that any packet must be authenticated through the proposed architecture. [6] protects a target using a filter that drops any packet whose source address is not approved. In the case of a DoS attack, rather than processing all arriving packets, the target's filter processes only a subset of received packets, and drops all the remaining.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…One can also study the architecture in reverse mode from users toward the target. We have proposed a preliminary version of the Fosel architecture in [25].…”
mentioning
confidence: 99%