skip to main content
10.1145/371920.372148acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Protecting web servers from distributed denial of service attacks

Authors Info & Claims
Published:01 April 2001Publication History
First page image

References

  1. 1.K. Hafner, M.Lyon. Where Wizards Stay Up Late. Simon & Schuster, New York, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.E.H. Spafford. The internet worm program: An analysis. Purdue Technical Report CSD-TR-823, Deoartment of Computer Sciences Purdue University, West Lafayette, IN. 1988.Google ScholarGoogle Scholar
  3. 3.D. Seeley. A tour of the worm. Department of Computer Science, University of Utah, 1988.Google ScholarGoogle Scholar
  4. 4.M. Eichin, J. Rochlis. With microscope and tweezers: An analysis of the internet virus of november 1988. Massachusetts Institute of Technology, 1988.Google ScholarGoogle Scholar
  5. 5.M. Williams. Ebay, amazon, buy.com hit by attacks, 02/09/00. IDG News Service, 02/09/00, http://www.nwfusion.com/news/2000/0209attack.html - visited 18.10.2000.Google ScholarGoogle Scholar
  6. 6.L. Stein. The world wide web security faq, version 2.0.1. http://www.w3.org/Security/Faq/ - visited 04.10.2000.Google ScholarGoogle Scholar
  7. 7.S.M Bellovin, W.R. Cheswick. Firewalls and Internet Security. Addison Wesley Longman, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Attrition mirrored sites. http://Attrition.org/mirror/attrition/ - visited 03.11.2000.Google ScholarGoogle Scholar
  9. 9.Dr. J.D. Howard. An analysis of security incidents on the internet 1989 - 1995. Carnegie Mellon University, Carnegie Institute of Technology, http://www.cert.org/research/JHThesis/ - visited 02.11.2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.J. Elliot. Distributed denial of service attacks and the zombie ant effect. IT Professional, Mar./Apr. 2000, pp55-57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.K.T. Fithen. em Internet Denial of Service Attacks and the Federal Response. Testimony before the Subcommittee on Crime of the House Committee on the Judiciary and the Subcommittee on Criminal Justice Oversight of the Senate Committee on the Judiciary, February 29, 2000, http://www.cert.org/congressional testimony/ Fithen testimony Feb29.html - visited 10.11.2000.Google ScholarGoogle Scholar
  12. 12.Results of the Distributed-Systems Intruder Tools Workshop Pittsburgh, Pensilvania USA, November 2-4 1999, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, http://www.cert.org/reports/dsit workshop.pdf - visited 12.11.2000.Google ScholarGoogle Scholar
  13. 13.Field Notice: 7xx Router Password Buffer Over ow Revision 1: December 15 1997, http://www.cisco.com/warp/public/770/pwbufpub.shtml - visited 18.10.2000.Google ScholarGoogle Scholar
  14. 14.Microsoft Security Bulletin (MS00-029): Patch available for 'IP Fragment Reassembly' Vulnerability. May 19, 2000, http://www.microsoft.com/technet/security/bulletin/ ms00-029.asp - visited 18.10.2000.Google ScholarGoogle Scholar
  15. 15.Microsoft Security Bulletin (MS00-23): Patch available for 'Myriad Escaped Characters' Vulnerability. April 12, 2000, http://www.microsoft.com/technet/security/bulletin/ ms00-023.asp - visited 18.10.2000.Google ScholarGoogle Scholar
  16. 16.K. Wooding. Magnification Attacks - Smurf, Fraggle, and Others. http://www.codetalker.com/whitepapers/dossmurf.html - visited 19.10.2000.Google ScholarGoogle Scholar
  17. 17.C.A. Huegen. The Latest in Denial of Service Attacks: 'Smuring'; Description and Information to Minimize Effects. http://www.pentics.net/denial-ofservice/white-papers/smurf.cgi - visited 19.10.2000.Google ScholarGoogle Scholar
  18. 18.CERT Advisory CA-98.01 'smurf' IP Denial-of-Service-Attacks. January 5, 1998, http://www.cert.org/advisories/CA-1998-01.html - visited 23.10.2000.Google ScholarGoogle Scholar
  19. 19.daemon9. route infinity, TCP SYN Flooding Attacks. Phrack magazine, Vol. 7, Issue 48, File 13 of 18, July 1996.Google ScholarGoogle Scholar
  20. 20.C.L.Schuba et.al. Analysis of a Denial of Service Attack on TCP. Coast Laboratory, Department of Computer Science, Purdue University.Google ScholarGoogle Scholar
  21. 21.CERT Advisory CA-96.21, TCP SYN Flooding and IP Spooning Attacks. September 19, 1996, http://www.cert.org/advisories/CA-1996-21.html - visited 23.10.2000.Google ScholarGoogle Scholar
  22. 22.Web servers / possible DOS Attack / mime header ooding (archive). http://www.securityfocus.com/archive/1/ f10516|10520|10521|10525|10526g - visited 23.10.2000.Google ScholarGoogle Scholar
  23. 23.YA Apache DoS attack (archive). http://www.securityfocus.com/archive/1/10228 - visited 23.10.2000.Google ScholarGoogle Scholar
  24. 24.Rootshell.com. http://www.rootshell.com/ - visited 08.02.2001.Google ScholarGoogle Scholar
  25. 25.D. Dittrich. The DoS Project's "trinoo" distributed denial of service attack tool. October 21, 1999, http://staff.washington.edu/dittrich/misc/ trinoo.analysis.txt - visited 13.11.2000.Google ScholarGoogle Scholar
  26. 26.Project Loki. Phrack Magazine, Volume Seven, Issue Forty-Nine, File 06 of 16, http://www.phrack.com/search.phtml?view &article=p49-6 - visited 23.10.2000.Google ScholarGoogle Scholar
  27. 27.L O K I 2 (the implementation). Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 06 of 17, http://www.phrack.com/search.phtml?view &article=p51-6 - visisted 23.10.2000.Google ScholarGoogle Scholar
  28. 28.D. Dittrich. The 'Tribe Flood Network' distributed denial of service attack tool. October 21, 1999, http://staff.washington.edu/dittrich/misc/ tfn.analysis.txt - visited 13.11.2000.Google ScholarGoogle Scholar
  29. 29.J. Barlow, W. Thrower. TFN2K - An Analysis. AXENT Security Team, February 10, 2000 (Updated March 7, 2000) Revision: 1.3, http://packetstorm.securify.com/distributed/ TFN2k Analysis-1.3.txt - visited 13.11.2000.Google ScholarGoogle Scholar
  30. 30.D. Dittrich. The 'stacheldraht' distributed denial of service attack tool. December 31, 1999, http://staff.washington.edu/dittrich/misc/ tfn.analysis.txt - visited 13.11.2000.Google ScholarGoogle Scholar
  31. 31.P. Ferguson, D. Senie. RFC 2267, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spooning. Cisco Systems Inc., BlazeNet Inc., January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32.D.J. Bernstein. SYN Cookies. ftp://koobera.math.uic.edu/syncookies.html - visited 13.11.2000.Google ScholarGoogle Scholar
  33. 33.X. Geng, A.B. Whinston. Defeating Distributed Denial of Service Attacks. IEEE IT-Pro, July/Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34.Submissions to the Paketstorm DDOS paper constest. http://packetstorm.securify.com/papers/contest/ - visited 13.11.2000.Google ScholarGoogle Scholar
  35. 35.Linux Virtual Server. http://www.linuxvirtualserver.org/ - visisted 13.11.2000.Google ScholarGoogle Scholar
  36. 36.Linux Advanced Routing HOWTO. http://www.linuxdoc.org/ - visited 14.02.2001.Google ScholarGoogle Scholar
  37. 37.Jef Poskanzer. http load. http://www.acme.com/software/ - visited 10.02.2001.Google ScholarGoogle Scholar
  38. 38.Arrowpoint. Whitepaper: Web Site Security and Denial of Service Protection. http://www.arrowpoint.com/solutions/white papers/ printer/Web Site Security.html - visited 12.11.2000.Google ScholarGoogle Scholar
  39. 39.F5. Whitepaper: A Defense To Denial of Service Attacks and Other Cyber Threats. http://secure.f5.com/solutions/whitepapers/ defense.html - visited 12.11.2000.Google ScholarGoogle Scholar

Index Terms

  1. Protecting web servers from distributed denial of service attacks

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    WWW '01: Proceedings of the 10th international conference on World Wide Web
                    May 2001
                    770 pages
                    ISBN:1581133480
                    DOI:10.1145/371920

                    Copyright © 2001 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 April 2001

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    Overall Acceptance Rate1,899of8,196submissions,23%

                    Upcoming Conference

                    WWW '24
                    The ACM Web Conference 2024
                    May 13 - 17, 2024
                    Singapore , Singapore

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader