The denial-of-service dance

被引:4
|
作者
Campbell, PL [1 ]
机构
[1] Sandia Natl Labs, Livermore, CA 94550 USA
关键词
Categorized attacks - Denial-of-service (DoS) - Hardware connection - Remote attacks;
D O I
10.1109/MSP.2005.162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The attack on computer security include attack on confidentiality, integrity and availability. Confidentiality and integrity can be attacked by breaking cryptography but attack on availability can be made with mounting a denial of service attack by flooding a victim with input. Effective defense mechanism can be developed if the types of attack available to an adversary is known. A denial-of-service attack based on dance hall metaphor, created by David Gresty and his colleague at Liverpool John Moore's University, is a step toward such an understanding. They have created denial-of-service matrix and categorized attacks in two types, Local attacks such as power cut, unplugging or improper hardware connection and Remote attacks.
引用
收藏
页码:34 / 40
页数:7
相关论文
共 50 条
  • [21] Inferring Internet denial-of-service activity
    Moore, D
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 9 - 22
  • [22] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [23] Speculative Denial-of-Service Attacks in Ethereum
    Yaish, Aviv
    Qin, Kaihua
    Zhou, Liyi
    Zohar, Aviv
    Gervais, Arthur
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3531 - 3548
  • [24] Inferring Internet denial-of-service activity
    Moore, David
    Shannon, Colleen
    Brown, Douglas J.
    Voelker, Geoffrey M.
    Savage, Stefan
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2006, 24 (02): : 115 - 139
  • [25] Keeping denial-of-service attackers in the dark
    Badishi, Gal
    Herzberg, Amir
    Keidar, Idit
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) : 191 - 204
  • [26] Denial-of-Service attack Possibilities on NFC Technology
    Fahrianto, Feri
    Lubis, Muhammad Fadil
    Fiade, Andrew
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 228 - 232
  • [27] Detecting Denial-of-Service Attacks Using sFlow
    Hublikar, Shivaraj
    Eligar, Vijaya
    Kakhandki, Arun
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 483 - 491
  • [28] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [29] On Consensus and Stability under Denial-of-Service Attacks
    Girejko, Ewa
    ENTROPY, 2022, 24 (02)
  • [30] A NOTE ON DENIAL-OF-SERVICE IN OPERATING-SYSTEMS
    GLIGOR, VD
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (03) : 320 - 324