• DocumentCode
    3783231
  • Title

    Distributed denial of service attacks

  • Author

    F. Lau;S.H. Rubin;M.H. Smith;L. Trajkovic

  • Author_Institution
    Simon Fraser Univ., Burnaby, BC, Canada
  • Volume
    3
  • fYear
    2000
  • Firstpage
    2275
  • Abstract
    We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: "flood" a network and thus reduce a legitimate user´s bandwidth, prevent access to a service, or disrupt service to a specific system or a user. We describe methods and techniques used in denial of service attacks, and we list possible defences. In our study, we simulate a distributed denial of service attack using ns-2 network simulator. We examine how various queuing algorithms implemented in a network router perform during an attack, and whether legitimate users can obtain desired bandwidth. We find that under persistent denial of service attacks, class based queuing algorithms can guarantee bandwidth for certain classes of input flows.
  • Keywords
    "Computer crime","Bandwidth","Web and internet services","Protection","Telecommunication traffic","Traffic control","Layout"
  • Publisher
    ieee
  • Conference_Titel
    Systems, Man, and Cybernetics, 2000 IEEE International Conference on
  • ISSN
    1062-922X
  • Print_ISBN
    0-7803-6583-6
  • Type

    conf

  • DOI
    10.1109/ICSMC.2000.886455
  • Filename
    886455