- 1.K. Hafner, M.Lyon. Where Wizards Stay Up Late. Simon & Schuster, New York, 1996. Google ScholarDigital Library
- 2.E.H. Spafford. The internet worm program: An analysis. Purdue Technical Report CSD-TR-823, Deoartment of Computer Sciences Purdue University, West Lafayette, IN. 1988.Google Scholar
- 3.D. Seeley. A tour of the worm. Department of Computer Science, University of Utah, 1988.Google Scholar
- 4.M. Eichin, J. Rochlis. With microscope and tweezers: An analysis of the internet virus of november 1988. Massachusetts Institute of Technology, 1988.Google Scholar
- 5.M. Williams. Ebay, amazon, buy.com hit by attacks, 02/09/00. IDG News Service, 02/09/00, http://www.nwfusion.com/news/2000/0209attack.html - visited 18.10.2000.Google Scholar
- 6.L. Stein. The world wide web security faq, version 2.0.1. http://www.w3.org/Security/Faq/ - visited 04.10.2000.Google Scholar
- 7.S.M Bellovin, W.R. Cheswick. Firewalls and Internet Security. Addison Wesley Longman, 1994. Google ScholarDigital Library
- 8.Attrition mirrored sites. http://Attrition.org/mirror/attrition/ - visited 03.11.2000.Google Scholar
- 9.Dr. J.D. Howard. An analysis of security incidents on the internet 1989 - 1995. Carnegie Mellon University, Carnegie Institute of Technology, http://www.cert.org/research/JHThesis/ - visited 02.11.2000. Google ScholarDigital Library
- 10.J. Elliot. Distributed denial of service attacks and the zombie ant effect. IT Professional, Mar./Apr. 2000, pp55-57. Google ScholarDigital Library
- 11.K.T. Fithen. em Internet Denial of Service Attacks and the Federal Response. Testimony before the Subcommittee on Crime of the House Committee on the Judiciary and the Subcommittee on Criminal Justice Oversight of the Senate Committee on the Judiciary, February 29, 2000, http://www.cert.org/congressional testimony/ Fithen testimony Feb29.html - visited 10.11.2000.Google Scholar
- 12.Results of the Distributed-Systems Intruder Tools Workshop Pittsburgh, Pensilvania USA, November 2-4 1999, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, http://www.cert.org/reports/dsit workshop.pdf - visited 12.11.2000.Google Scholar
- 13.Field Notice: 7xx Router Password Buffer Over ow Revision 1: December 15 1997, http://www.cisco.com/warp/public/770/pwbufpub.shtml - visited 18.10.2000.Google Scholar
- 14.Microsoft Security Bulletin (MS00-029): Patch available for 'IP Fragment Reassembly' Vulnerability. May 19, 2000, http://www.microsoft.com/technet/security/bulletin/ ms00-029.asp - visited 18.10.2000.Google Scholar
- 15.Microsoft Security Bulletin (MS00-23): Patch available for 'Myriad Escaped Characters' Vulnerability. April 12, 2000, http://www.microsoft.com/technet/security/bulletin/ ms00-023.asp - visited 18.10.2000.Google Scholar
- 16.K. Wooding. Magnification Attacks - Smurf, Fraggle, and Others. http://www.codetalker.com/whitepapers/dossmurf.html - visited 19.10.2000.Google Scholar
- 17.C.A. Huegen. The Latest in Denial of Service Attacks: 'Smuring'; Description and Information to Minimize Effects. http://www.pentics.net/denial-ofservice/white-papers/smurf.cgi - visited 19.10.2000.Google Scholar
- 18.CERT Advisory CA-98.01 'smurf' IP Denial-of-Service-Attacks. January 5, 1998, http://www.cert.org/advisories/CA-1998-01.html - visited 23.10.2000.Google Scholar
- 19.daemon9. route infinity, TCP SYN Flooding Attacks. Phrack magazine, Vol. 7, Issue 48, File 13 of 18, July 1996.Google Scholar
- 20.C.L.Schuba et.al. Analysis of a Denial of Service Attack on TCP. Coast Laboratory, Department of Computer Science, Purdue University.Google Scholar
- 21.CERT Advisory CA-96.21, TCP SYN Flooding and IP Spooning Attacks. September 19, 1996, http://www.cert.org/advisories/CA-1996-21.html - visited 23.10.2000.Google Scholar
- 22.Web servers / possible DOS Attack / mime header ooding (archive). http://www.securityfocus.com/archive/1/ f10516|10520|10521|10525|10526g - visited 23.10.2000.Google Scholar
- 23.YA Apache DoS attack (archive). http://www.securityfocus.com/archive/1/10228 - visited 23.10.2000.Google Scholar
- 24.Rootshell.com. http://www.rootshell.com/ - visited 08.02.2001.Google Scholar
- 25.D. Dittrich. The DoS Project's "trinoo" distributed denial of service attack tool. October 21, 1999, http://staff.washington.edu/dittrich/misc/ trinoo.analysis.txt - visited 13.11.2000.Google Scholar
- 26.Project Loki. Phrack Magazine, Volume Seven, Issue Forty-Nine, File 06 of 16, http://www.phrack.com/search.phtml?view &article=p49-6 - visited 23.10.2000.Google Scholar
- 27.L O K I 2 (the implementation). Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 06 of 17, http://www.phrack.com/search.phtml?view &article=p51-6 - visisted 23.10.2000.Google Scholar
- 28.D. Dittrich. The 'Tribe Flood Network' distributed denial of service attack tool. October 21, 1999, http://staff.washington.edu/dittrich/misc/ tfn.analysis.txt - visited 13.11.2000.Google Scholar
- 29.J. Barlow, W. Thrower. TFN2K - An Analysis. AXENT Security Team, February 10, 2000 (Updated March 7, 2000) Revision: 1.3, http://packetstorm.securify.com/distributed/ TFN2k Analysis-1.3.txt - visited 13.11.2000.Google Scholar
- 30.D. Dittrich. The 'stacheldraht' distributed denial of service attack tool. December 31, 1999, http://staff.washington.edu/dittrich/misc/ tfn.analysis.txt - visited 13.11.2000.Google Scholar
- 31.P. Ferguson, D. Senie. RFC 2267, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spooning. Cisco Systems Inc., BlazeNet Inc., January 1998. Google ScholarDigital Library
- 32.D.J. Bernstein. SYN Cookies. ftp://koobera.math.uic.edu/syncookies.html - visited 13.11.2000.Google Scholar
- 33.X. Geng, A.B. Whinston. Defeating Distributed Denial of Service Attacks. IEEE IT-Pro, July/Aug. 2000. Google ScholarDigital Library
- 34.Submissions to the Paketstorm DDOS paper constest. http://packetstorm.securify.com/papers/contest/ - visited 13.11.2000.Google Scholar
- 35.Linux Virtual Server. http://www.linuxvirtualserver.org/ - visisted 13.11.2000.Google Scholar
- 36.Linux Advanced Routing HOWTO. http://www.linuxdoc.org/ - visited 14.02.2001.Google Scholar
- 37.Jef Poskanzer. http load. http://www.acme.com/software/ - visited 10.02.2001.Google Scholar
- 38.Arrowpoint. Whitepaper: Web Site Security and Denial of Service Protection. http://www.arrowpoint.com/solutions/white papers/ printer/Web Site Security.html - visited 12.11.2000.Google Scholar
- 39.F5. Whitepaper: A Defense To Denial of Service Attacks and Other Cyber Threats. http://secure.f5.com/solutions/whitepapers/ defense.html - visited 12.11.2000.Google Scholar
Index Terms
- Protecting web servers from distributed denial of service attacks
Recommendations
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques
EISIC '11: Proceedings of the 2011 European Intelligence and Security Informatics ConferenceDisruption of service caused by distributed denial of services (DDoS) attacks is an increasing problem in the Internet world. At the present time, to attack the victim's system, the attacker uses sophisticated automated attacking tools for DDoS attack, ...
Distributed denial of service attacks and its defenses in IoT: a survey
AbstractA distributed denial of service (DDoS) attack is an attempt to partially or completely shut down the targeted server with a flood of internet traffic. The primary aim of this attack is to disrupt regular traffic flow to the victim’s server or ...
Comments