Stealth DoS

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:b769bd017d7ac833cc4d1ac62aaf3c23

WALDVOGEL, Marcel, Michael MUNCAN, Mahak PATIDAR, 2006. Stealth DoS. Monitoring, Attack Detection and Mitigation. Tübingen, Germany, 28. Sep 2006 - 29. Sep 2006. In: IEEE, IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 - Friday 29 September, 2006 Tübingen, Germany. Monitoring, Attack Detection and Mitigation. Tübingen, Germany, 28. Sep 2006 - 29. Sep 2006

@inproceedings{Waldvogel2006Steal-6205, title={Stealth DoS}, year={2006}, booktitle={IEEE, IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 - Friday 29 September, 2006 Tübingen, Germany}, author={Waldvogel, Marcel and Muncan, Michael and Patidar, Mahak} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/6205"> <dcterms:bibliographicCitation>Paper pres. to: IEEE / IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 / Friday 29 September, 2006 Tübingen, Germany</dcterms:bibliographicCitation> <dc:contributor>Muncan, Michael</dc:contributor> <dc:contributor>Waldvogel, Marcel</dc:contributor> <dc:format>application/pdf</dc:format> <dc:language>eng</dc:language> <dc:creator>Waldvogel, Marcel</dc:creator> <dc:creator>Patidar, Mahak</dc:creator> <dcterms:rights rdf:resource="http://nbn-resolving.org/urn:nbn:de:bsz:352-20140905103416863-3868037-7"/> <dcterms:issued>2006</dcterms:issued> <dc:rights>deposit-license</dc:rights> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:11Z</dcterms:available> <dc:creator>Muncan, Michael</dc:creator> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6205"/> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:11Z</dc:date> <dcterms:title>Stealth DoS</dcterms:title> <dcterms:abstract xml:lang="eng">Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermea- sure, as a DoS measure. Given the nature of their business relationship, neither side is likely to openly admit that they are fighting each other. In this paper we attempt to formalise the concept of Stealth DoS, including listing mechanisms that may be used at high speed. We concentrate on mechanisms that might be used in one particular area, voice over IP (VoIP). We start evaluating them under the different aspects, including their cost, political suitability and the likelihood for countermea- sures to succeed. We expect that this will give both sides better insight on their options and plea for peace, hopefully in an attempt to avoid and open war.</dcterms:abstract> <dc:contributor>Patidar, Mahak</dc:contributor> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

waldvogel06stealth.pdf 52

Das Dokument erscheint in:

KOPS Suche


Stöbern

Mein Benutzerkonto