Quantifying Network Denial of Service: A Location Service Case Study
dc.contributor.author | Chen, Yan | |
dc.contributor.author | Bargteil, Adam | |
dc.contributor.author | Bindel, David | |
dc.contributor.author | Katz, Randy H. | |
dc.contributor.author | Kubiatowicz, John | |
dc.date.accessioned | 2019-09-19T15:00:35Z | |
dc.date.available | 2019-09-19T15:00:35Z | |
dc.date.issued | 2001-10-24 | |
dc.description.abstract | Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this paper, we propose a simulation-based methodology and apply it to attacks on object location services such as DNS. Our results allow us to contrast the DoS resilience of three distinct architectures for object location. | en_US |
dc.description.sponsorship | The research is supported by NSF career award #ANI -9985250, DARPA grant #N66001-99-2-8913, and DARPA grant #DABT63-96-C-0056. David Bindel is supported by an NSF Graduate fellowship. | en_US |
dc.description.uri | https://link.springer.com/chapter/10.1007%2F3-540-45600-7_37 | en_US |
dc.format.extent | 12 pages | en_US |
dc.genre | conference proceedings and papers preprints | en_US |
dc.identifier | doi:10.13016/m2m2y8-tcff | |
dc.identifier.citation | Chen Y., Bargteil A., Bindel D., Katz R.H., Kubiatowicz J. (2001) Quantifying Network Denial of Service: A Location Service Case Study. In: Qing S., Okamoto T., Zhou J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg | en_US |
dc.identifier.uri | https://doi.org/10.1007/3-540-45600-7_37 | |
dc.identifier.uri | http://hdl.handle.net/11603/14586 | |
dc.language.iso | en_US | en_US |
dc.publisher | Springer, Berlin, Heidelberg | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | directory service | en_US |
dc.subject | flooding attack | en_US |
dc.subject | domain name service | en_US |
dc.subject | IEEE Computer Security Foundation Workshop | en_US |
dc.subject | realistic network topology | en_US |
dc.subject | UMBC Computer Animation Lab | en_US |
dc.title | Quantifying Network Denial of Service: A Location Service Case Study | en_US |
dc.type | Text | en_US |