2001
DOI: 10.1007/3-540-45474-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Autonomic Response to Distributed Denial of Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 1 publication
0
25
0
Order By: Relevance
“…Otherwise, the effects of the thread get added as local event 5 All other agents, with the exception of the controller agent that sends arbitrary XML files to a designated host and port, were not associated with the worm simulation project. 6 To clarify attack identifiers, suppose an experiment consisted of two worms.…”
Section: Host-based Agentmentioning
confidence: 99%
See 1 more Smart Citation
“…Otherwise, the effects of the thread get added as local event 5 All other agents, with the exception of the controller agent that sends arbitrary XML files to a designated host and port, were not associated with the worm simulation project. 6 To clarify attack identifiers, suppose an experiment consisted of two worms.…”
Section: Host-based Agentmentioning
confidence: 99%
“…If a high-level IDS predicts an attacker's goals or future targets, this information could be used to reconfigure these agents to better deceive the attacker. Other response agents, such as DDoS mitigation systems [4,5,6], can also be used and configured based on their requirements and expected performance.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, if an active router detects an attack attempt it will send an active packet to the other edge active router to block the attacking packets. Unlike some other approaches [10,11,12,13,14], this architecture allows the network to work without relying on a central management server.…”
Section: The Active Router Architecturementioning
confidence: 99%
“…It is not possible to adjust the attack detection so that exactly only legitimate traffic would get in. This fact has been recognized in existing DDoS toolkits which generate attack traffic looking very similar to legitimate traffic [5].…”
Section: Effectivenessmentioning
confidence: 95%
“…Sometimes evaluation is carried out under ideal conditions, where there are no false positives and no collateral damage, such as when studying rate-limiting in [5]. Three existing preventive defence mechanisms were compared in [6], and it was found out that they were originally evaluated according to restricted criteria, ignoring the risk of attacks that they cannot solve.…”
Section: Introductionmentioning
confidence: 99%