Proceedings of the 9th ACM Conference on Computer and Communications Security - CCS '02 2002
DOI: 10.1145/586135.586136
|View full text |Cite
|
Sign up to set email alerts
|

Query-flood DoS attacks in gnutella

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2004
2004
2008
2008

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Thus attacks, such as denial-of-service and storage overflow, may occur to the exposed node, whether it is malicious or not. [7,8] The existing techniques to secure anonymity include MUTE [10], Onion Routing [12,13], Crowds [11] and Mantis [9]. In order for MUTE to protect anonymity, file share is made through other clients such as jondo.…”
Section: Introductionmentioning
confidence: 99%
“…Thus attacks, such as denial-of-service and storage overflow, may occur to the exposed node, whether it is malicious or not. [7,8] The existing techniques to secure anonymity include MUTE [10], Onion Routing [12,13], Crowds [11] and Mantis [9]. In order for MUTE to protect anonymity, file share is made through other clients such as jondo.…”
Section: Introductionmentioning
confidence: 99%
“…The network-level attacks actually include the attacks in the network and transport levels from the viewpoint of the OSI model. On the other hand, the application-level attacks refer to those query-flood attacks in the application level [3].…”
Section: Existing Workmentioning
confidence: 99%
“…Repeated failures to load the page or persistent instability in performance will drive users away. It is arguable that application-level attacks cause even severe damages since they consume more system resources than their network-layer counterparts [3].…”
Section: Existing Workmentioning
confidence: 99%
“…In P2P systems, much work has been focusing on routing efficiency and scalability [4] and some areas of security such as secure routing [5] and DOS (denial of service) attacks [6]. In the active worm area, much work has been done in worm modeling such as the computer virus model [7], active worm spreading model [8], and Code-Red worm model [1].…”
Section: Introductionmentioning
confidence: 99%