Protection against denial of service attacks: a survey
Loukas, Georgios and Öke, Gülay (2010) Protection against denial of service attacks: a survey. The Computer Journal, 53 (7). pp. 1020-1037. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:10.1093/comjnl/bxp078)Full text not available from this repository.
Denial of service (DoS) is a prevalent threat in today’s networks because DoS attacks are easy to launch, while defending a network resource against them is disproportionately difficult. Despite the extensive research in recent years, DoS attacks continue to harm, as the attackers adapt to the newer protection mechanisms.For this reason, we start our survey with a historical timeline of DoS incidents, where we illustrate the variety of types, targets and motives for such attacks and how they evolved during the last two decades. We then provide an extensive literature review on the existing research on DoS protection with an emphasis on the research of the last years and the most demanding aspects of defence. These include traceback, detection, classification of incoming traffic, response in the presence of an attack and mathematical modelling of attack and defence mechanisms. Our discussion aims to identify the trends in DoS attacks, the weaknesses of protection approaches and the qualities that modern ones should exhibit, so as to suggest new directions that DoS research can follow.
|Additional Information:|| First published online: August 19, 2009.  Incorporating Special Issue: Architecture/OS Support for Embedded Multi-Core Systems.  The Computer Journal is published by Oxford University Press on behalf of BCS, The Chartered Institute for IT.|
|Uncontrolled Keywords:||denial of service, computer networks, network security|
|Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
T Technology > T Technology (General)
|School / Department / Research Groups:||School of Computing & Mathematical Sciences|
School of Computing & Mathematical Sciences > Department of Smart Systems Technologies
|Last Modified:||24 Jan 2014 10:05|
Actions (login required)