Quantifying Network Denial of Service: A Location Service Case Study
Purchase on Springer.com
$29.95 / €24.95 / £19.95*
* Final gross prices may vary according to local VAT.
Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this paper, we propose a simulation-based methodology and apply it to attacks on object location services such as DNS. Our results allow us to contrast the DoS resilience of three distinct architectures for object location.
- V. Almeida, et al. Characterizing reference locality in the WWW. In Proceeding of the IEEE Conf. on Parallel and Distributed Information Systems, 1996.
- J. Bayuk, Measuring Security, First workshop on information-security-system rating and ranking, 2001
- Lee Breslau, et al. Advances in network simulation. IEEE Computer, 33(5):59–67, May 2000.
- A. Brown and D. Patterson, Towards availability benchmarks: A case study of software RAID systems. In Proceedings of the 2000 USENIX Conference.
- Y. Chen, A. Bargteil, R. Katz, and J. Kubiatowicz. Quantifying Network Denial of Service: A Location Service Case Study UCB Tech. Report UCB/CSD-01-1150
- S. Czerwinski, B. Zhao, T. Hodes, A. Joseph, and R. Katz. An architecture for a secure service discovery service. In Proceedings of ACM MOBICOM, August 1999.
- M. Delio New breed of attack zombies lurk, May 2001. http://www.wired.com/news/technology/0,1282,43697,00.html.
- S. Dietrich, et al. Anaylzing distributed denial of service tools: the Shaft case. In Proceedings of the 14th Systems Administration Conference, 2000
- V. Gligor. A note on the DoS problem. In Proceedings of the 1983 Symposium on Security and Privacy, 1983.
- E. Guttman, C. Perkins, J. Veizades, and M. Day. Service Location Protocol, Version 2. IETF Internet Draft, November 1998. RFC 2165.
- J. Howard. An Analysis of Security Incidents on the Internet. PhD thesis, Carnegie Mellon University, Aug. 1998.
- T. Howes. The Lightweight Directory Access Protocol: X.500 Lite. Technical Report 95-8, Center for Information Technology Integration, U. Mich., July 1995.
- Computer Security Institute and Federal Bureau of Investigation. CSI/FBI computer crime and security survey. In Computer Security Institute publication, 2000.
- J. Jannotti, et al. Overcast: Reliable multicasting with an overlay network. In 4th Symposium on Operating Systems Design & Implementation, Oct. 2000.
- C. Meadows. A formal framework and evaluation method for network denial of service. In Proc. of the IEEE Computer Security Foundations Workshop, 1999.
- J. Millen. DoS: A perspective. In Dependable Computing for Critical Applications4, 1995.
- G. Plaxton, et al. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of SCP Symposium on Parallel Alg. and Arch., 1997.
- M. Rabinovich, et al. A dynamic object replication and migration protocol for an internet hosting service. In Proceedings of IEEE ICDCS, 1999.
- S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. to appear in Proceeding of ACM SIGCOMM, 2001.
- C. Schuba, I. Krsul, M. Kuhn, and et. al. Analysis of a DoS attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
- O. Spatscheck and L. Peterson. Defending against DoS attacks in Scout. In Proceedings of SOSP, 1999.
- I. Stoica, et al. Chord: A scalable peer-to-peer lookup service for Internet applications. to appear in Proceedings of ACM SIGCOMM, 2001.
- C. Yu and V. Gligor. Specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6), June 1990.
- E. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internetwork. In Proceedings of IEEE Infocom, 1996.
- B. Zhao, J. Kubiatowicz, and A. Joseph. Tapestry: An infrastructure for faulttolerant wide-area location and routing. UCB Tech. Report UCB/CSD-01-1141.
- Quantifying Network Denial of Service: A Location Service Case Study
- Book Title
- Information and Communications Security
- Book Subtitle
- Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings
- pp 340-351
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 4. Engineering Research Center for Information Security Technology (ERCIST), Chinese Academy of Sciences
- 5. NTT Labs
- 6. Oracle Corporation
- Author Affiliations
- 7. Computer Science Division, University of California, Berkeley
To view the rest of this content please follow the download PDF link above.