418 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author원영준-
dc.date.accessioned2018-07-25T08:01:40Z-
dc.date.available2018-07-25T08:01:40Z-
dc.date.issued2011-10-
dc.identifier.citationNetwork and Service Management (CNSM), 2011 7th International Conference on 2011 Oct,2011년, pp.1 - 7en_US
dc.identifier.isbn978-3-901882-44-9-
dc.identifier.isbn978-1-4577-1588-4-
dc.identifier.issn2165-9605-
dc.identifier.issn2165-963X-
dc.identifier.urihttps://ieeexplore.ieee.org/document/6103957/-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/72940-
dc.description.abstractIn July 2009, surprising large-scale Distributed Denial-of-Service (DDoS) attacks simultaneously targeted US and South Korean government, military, and commercial websites. Initial speculation was that this was well-designed cyber warfare from North Korea, but the truth is still unknown. What was even more surprising was how these critical infrastructures were still vulnerable after a decade of research on DDoS attacks. These particular incidents, the so-called 7.7 (July 7th) DDoS attacks, were highlighted not just because of their success but also because of their well-coordinated strategy. The 3.3 (March 3rd, 2011) DDoS attacks had similar characteristics to the 7.7 DDoS attacks, but they were not as successful because of the rapid vaccination of the zombie hosts. In this paper, we suggest that it is worthwhile to take a step back from the target side of the DDoS attacks and look at the problem in terms of network traffic from the attacker's side. We collected a unique large-scale sample of DDoS attack traffic from the two real-world incidents (not simulated), and we provide an analysis of traffic patterns from the perspective of the attacker's hosting network.en_US
dc.description.sponsorshipThis research was supported by the KCC(Korea Communications Commission), Korea, under the “Novel Study on Highly Manageable Network and Service Architecture for New Generation” support program supervised by the KCA(Korea Communications Agency) (KCA-2011-10921-05003) and WCU (World Class University) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (R31-2010-000-10100-0).en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.subjectTraffic Analysisen_US
dc.subjectDDoSen_US
dc.subjectMonitoringen_US
dc.titleWitnessing distributed denial-of-service traffic from an attacker's networken_US
dc.typeArticleen_US
dc.relation.volume7-
dc.relation.page241-247-
dc.contributor.googleauthorSeo, Sin-seok-
dc.contributor.googleauthorWon, Young J-
dc.contributor.googleauthorJames Won-Ki Hong-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF INFORMATION SYSTEMS-
dc.identifier.pidyoungjoon-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > INFORMATION SYSTEMS(정보시스템학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE