Towards network denial of service resistant protocols

J. Leiwo, T. Aura, P. Nikander

Research output: Contribution to journalConference articleScientificpeer-review

16 Citations (Scopus)
28 Downloads (Pure)

Abstract

Networked and distributed systems have introduced a new significant threat iu the availability of data. and services: network denial of service attacks. A well known example: Is the TCP SYN flooding. In general, any statefull handshake protocol is vulnerable to similar attacks. This paper examines the network denial of service in detail and surveys and compares different approaches towards preventing the :attacks:ks. As a conclusion, a number of protocol design principles are identified essential in designing network denial of service resistant protocols, and examples provided on applying the principles.
Original languageEnglish
Pages (from-to)301-310
Number of pages10
JournalIFIP Advances in Information and Communication Technology
Volume47
Publication statusPublished - 2000
MoE publication typeA4 Article in a conference publication
EventIFIP World Computer Congress - Beijing, China
Duration: 21 Aug 200025 Aug 2000
Conference number: 16

Keywords

  • protocols
  • denial of service

Fingerprint Dive into the research topics of 'Towards network denial of service resistant protocols'. Together they form a unique fingerprint.

  • Cite this