Ec2nd 2005
DOI: 10.1007/1-84628-352-3_2
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks

Abstract: Abstract. This paper describes a set of criteria for evaluating defence mechanisms against flooding denial of service (DoS) attacks. Effectiveness and usefulness of a defence mechanism in mitigating a DoS attack depends on many issues which are presented here in the form of a taxonomy. The primary goal of this taxonomy is to help in getting a comprehensive view on both the strengths and weaknesses of a specific defence mechanism. A good defence mechanism should not disturb legitimate traffic when there is no a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The compare and taxonomy research work is needed in the defense mechanisms field. [7] proposes a taxonomy mechanism for evaluation criteria in DDoS defense strategies. It generalizes evaluation criteria, but it dose not include concrete compare applications.…”
Section: Current Evaluation Researchmentioning
confidence: 99%
“…The compare and taxonomy research work is needed in the defense mechanisms field. [7] proposes a taxonomy mechanism for evaluation criteria in DDoS defense strategies. It generalizes evaluation criteria, but it dose not include concrete compare applications.…”
Section: Current Evaluation Researchmentioning
confidence: 99%
“…However, adaptation of novel approaches is only possible if they can be thoroughly evaluated and appropriate recommendations made with regard to their use. Molsa describes taxonomy of criteria for evaluating defense mechanisms against denial of service attacks [75] . Criteria such as effectiveness during normal activity and attack, ability to fulfill requirements on application quality of service, robustness against misuse, resilience against changes in attack characteristics, configuration capabilities, and interoperability are considered.…”
Section: Evolution Of Security Toolsmentioning
confidence: 99%