Loading [a11y]/accessibility-menu.js
Distributed denial of service attacks | IEEE Conference Publication | IEEE Xplore

Distributed denial of service attacks


Abstract:

We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, ...Show More

Abstract:

We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: "flood" a network and thus reduce a legitimate user's bandwidth, prevent access to a service, or disrupt service to a specific system or a user. We describe methods and techniques used in denial of service attacks, and we list possible defences. In our study, we simulate a distributed denial of service attack using ns-2 network simulator. We examine how various queuing algorithms implemented in a network router perform during an attack, and whether legitimate users can obtain desired bandwidth. We find that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Date of Conference: 08-11 October 2000
Date Added to IEEE Xplore: 06 August 2002
Print ISBN:0-7803-6583-6
Print ISSN: 1062-922X
Conference Location: Nashville, TN, USA

Contact IEEE to Subscribe

References

References is not available for this document.