A Shevtekar, K Anantharam… - IEEE Communications …, 2005 - ieeexplore.ieee.org
Low rate TCP denial-of-service attacks are a new type of DoS attacks that are carefully orchestrated to exploit the fixed minimum TCP RTO property and thereby deny services to …
CM Cheng, HT Kung, KS Tan - … Conference, 2002. GLOBECOM' …, 2002 - ieeexplore.ieee.org
We propose using spectral analysis to identify normal TCP traffic so that it will not be dropped or rate-limited in defense against denial of service (DoS) attacks. The approach can …
H Sun, JCS Lui, DKY Yau - Computer Networks, 2006 - Elsevier
In this paper, we consider a distributed mechanism to detect and to defend against the low- rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it is a …
Z Chen, CK Yeo, BS Lee, CT Lau - Computer Networks, 2018 - Elsevier
Abstract Low-Rate DoS (LDoS) attacks send periodical packet bursts to the bottleneck routers which can throttle the bandwidth of TCP flows. They are difficult to detect while …
X Zhang, SF Wu, Z Fu, TL Wu - Proceedings 2000 International …, 2000 - ieeexplore.ieee.org
Among various types of denial of service attacks," dropping attack" is probably the most difficult one to handle. This paper explores the negative impacts of packet dropping attacks …
H Sun, JCS Lui, DKY Yau - Proceedings of the 12th IEEE …, 2004 - ieeexplore.ieee.org
We consider a distributed approach to detect and to defend against the low-rate TCP attack (A. Kuzmanovic et al., August 2003). The low-rate TCP attack is essentially a periodic short …
Y Huang, JM Pullen - Proceedings Tenth International …, 2001 - ieeexplore.ieee.org
Denial-of-service (DoS) attacks have received a great amount of attention in research communities and general public alike, due to recent, high-profile attacks against major …
S Sarat, A Terzis - Proceedings. 14th International Conference …, 2005 - ieeexplore.ieee.org
Router queues buffer packets during congestion epochs. A recent result by Appenzeller et al. showed that the size of FIFO queues can be reduced considerably without sacrificing …
C Zhang, J Yin, Z Cai, W Chen - IEEE Communications Letters, 2010 - ieeexplore.ieee.org
The existing Random Early Detection (RED) algorithm and its variants are found vulnerable to emerging attacks, especially the Low-rate Denial-of-Service (LDoS) attacks. In this letter …