Towards network denial of service resistant protocols

J Leiwo, T Aura, P Nikander - IFIP International Information Security …, 2000 - Springer
J Leiwo, T Aura, P Nikander
IFIP International Information Security Conference, 2000Springer
Networked and distributed systems have introduced a new significant threat to the
availability of data and services: network denial of service attacks. A well known example is
the TCP SYN flooding. In general, any statefull handshake protocol is vulnerable to similar
attacks. This paper examines the network denial of service in detail and surveys and
compares different approaches towards preventing the attacks. As a conclusion, a number of
protocol design principles are identified essential in designing network denial of service …
Abstract
Networked and distributed systems have introduced a new significant threat to the availability of data and services: network denial of service attacks. A well known example is the TCP SYN flooding. In general, any statefull handshake protocol is vulnerable to similar attacks. This paper examines the network denial of service in detail and surveys and compares different approaches towards preventing the attacks. As a conclusion, a number of protocol design principles are identified essential in designing network denial of service resistant protocols, and examples provided on applying the principles.
Springer
Showing the best result for this search. See all results