2015
DOI: 10.1007/978-3-319-26362-5_24
|View full text |Cite
|
Sign up to set email alerts
|

Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Each bucket is a linked list of entries holding counts for distinct words that hash to the same bucket. As each word is scanned from the input, the program invokes the add_word function (Lines [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. This function first computes a hash value for that word-implemented in compute_hash (Lines 14-20)-and then attempts to find an existing entry for that word (Lines [28][29][30][31][32][33][34][35][36][37].…”
Section: Overview 21 a Motivating Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Each bucket is a linked list of entries holding counts for distinct words that hash to the same bucket. As each word is scanned from the input, the program invokes the add_word function (Lines [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. This function first computes a hash value for that word-implemented in compute_hash (Lines 14-20)-and then attempts to find an existing entry for that word (Lines [28][29][30][31][32][33][34][35][36][37].…”
Section: Overview 21 a Motivating Examplementioning
confidence: 99%
“…Crosby and Wallach were the first to demonstrate denial-ofservice (DoS) attacks that exploit algorithmic complexity vulnerabilities [23]. Subsequent work on detecting and preventing DoS attacks [9,25,64] has typically focused on measuring aggregate resource exhaustion and does not specifically identify input characteristics that exploit worst-case algorithmic complexity.…”
Section: Related Workmentioning
confidence: 99%
“…A second example concerns the security domain, where several distributed applications can suffer from the so-called Denial of Service (DoS) attacks. According to [36] and [21], a DoS attack causes starvation because it deprives the resources of a target victim to provide services to legitimate users. Research in this domain is typically conducted from an empirical point of view, however we believe that, due to their complexity, such issues can benefit from a formal approach.…”
Section: Techniquesmentioning
confidence: 99%