DocumentCode
3783231
Title
Distributed denial of service attacks
Author
F. Lau;S.H. Rubin;M.H. Smith;L. Trajkovic
Author_Institution
Simon Fraser Univ., Burnaby, BC, Canada
Volume
3
fYear
2000
Firstpage
2275
Abstract
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: "flood" a network and thus reduce a legitimate user´s bandwidth, prevent access to a service, or disrupt service to a specific system or a user. We describe methods and techniques used in denial of service attacks, and we list possible defences. In our study, we simulate a distributed denial of service attack using ns-2 network simulator. We examine how various queuing algorithms implemented in a network router perform during an attack, and whether legitimate users can obtain desired bandwidth. We find that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
Keywords
"Computer crime","Bandwidth","Web and internet services","Protection","Telecommunication traffic","Traffic control","Layout"
Publisher
ieee
Conference_Titel
Systems, Man, and Cybernetics, 2000 IEEE International Conference on
ISSN
1062-922X
Print_ISBN
0-7803-6583-6
Type
conf
DOI
10.1109/ICSMC.2000.886455
Filename
886455
Link To Document