Stealth DoS

Loading...
Thumbnail Image
Date
2006
Authors
Muncan, Michael
Patidar, Mahak
Editors
Contact
Journal ISSN
Electronic ISSN
ISBN
Bibliographical data
Publisher
Series
DOI (citable link)
ArXiv-ID
International patent number
Link to the license
EU project number
Project
Secure Networking and Storage
Open Access publication
Restricted until
Title in another language
Research Projects
Organizational Units
Journal Issue
Publication type
Contribution to a conference collection
Publication status
Published in
IEEE, IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 - Friday 29 September, 2006 Tübingen, Germany
Abstract
Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermea- sure, as a DoS measure. Given the nature of their business relationship, neither side is likely to openly admit that they are fighting each other. In this paper we attempt to formalise the concept of Stealth DoS, including listing mechanisms that may be used at high speed. We concentrate on mechanisms that might be used in one particular area, voice over IP (VoIP). We start evaluating them under the different aspects, including their cost, political suitability and the likelihood for countermea- sures to succeed. We expect that this will give both sides better insight on their options and plea for peace, hopefully in an attempt to avoid and open war.
Summary in another language
Subject (DDC)
004 Computer Science
Keywords
DoS,Stealth,mechanism,VoIP
Conference
Monitoring, Attack Detection and Mitigation, Sep 28, 2006 - Sep 29, 2006, Tübingen, Germany
Review
undefined / . - undefined, undefined. - (undefined; undefined)
Cite This
ISO 690WALDVOGEL, Marcel, Michael MUNCAN, Mahak PATIDAR, 2006. Stealth DoS. Monitoring, Attack Detection and Mitigation. Tübingen, Germany, Sep 28, 2006 - Sep 29, 2006. In: IEEE, IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 - Friday 29 September, 2006 Tübingen, Germany
BibTex
@inproceedings{Waldvogel2006Steal-6205,
  year={2006},
  title={Stealth DoS},
  booktitle={IEEE, IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 - Friday 29 September, 2006 Tübingen, Germany},
  author={Waldvogel, Marcel and Muncan, Michael and Patidar, Mahak}
}
RDF
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6205">
    <dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
    <dcterms:issued>2006</dcterms:issued>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:11Z</dcterms:available>
    <dc:format>application/pdf</dc:format>
    <dcterms:abstract xml:lang="eng">Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermea- sure, as a DoS measure. Given the nature of their business relationship, neither side is likely to openly admit that they are fighting each other. In this paper we attempt to formalise the concept of Stealth DoS, including listing mechanisms that may be used at high speed. We concentrate on mechanisms that might be used in one particular area, voice over IP (VoIP). We start evaluating them under the different aspects, including their cost, political suitability and the likelihood for countermea- sures to succeed. We expect that this will give both sides better insight on their options and plea for peace, hopefully in an attempt to avoid and open war.</dcterms:abstract>
    <dc:contributor>Patidar, Mahak</dc:contributor>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:11Z</dc:date>
    <dc:contributor>Waldvogel, Marcel</dc:contributor>
    <dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6205/1/waldvogel06stealth.pdf"/>
    <dcterms:bibliographicCitation>Paper pres. to: IEEE / IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 / Friday 29 September, 2006 Tübingen, Germany</dcterms:bibliographicCitation>
    <dc:creator>Waldvogel, Marcel</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6205/1/waldvogel06stealth.pdf"/>
    <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6205"/>
    <dc:creator>Patidar, Mahak</dc:creator>
    <dc:contributor>Muncan, Michael</dc:contributor>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dcterms:title>Stealth DoS</dcterms:title>
    <dc:creator>Muncan, Michael</dc:creator>
    <dc:language>eng</dc:language>
    <dc:rights>terms-of-use</dc:rights>
  </rdf:Description>
</rdf:RDF>
Internal note
xmlui.Submission.submit.DescribeStep.inputForms.label.kops_note_fromSubmitter
Contact
URL of original publication
Test date of URL
Examination date of dissertation
Method of financing
Comment on publication
Alliance license
Corresponding Authors der Uni Konstanz vorhanden
International Co-Authors
Bibliography of Konstanz
Yes
Refereed