Search

Current filters:

Search Results

  • <<
  • 1
  • >>
Item hits:
  • Thesis


  • Authors: Argyraki, Aikaterini (2006)

  • During a distributed bandwidth-flooding attack, a large number of attack sources coordinate to send a high volume of undesired traffic to the intended victim; the goal is to exhaust the victim's band-width, so that the victim fails to respond to its legitimate traffic. These attacks have proved difficult (sometimes impossible) to combat, as they require that action be taken before the victim's tail circuit. Current practice is typically restricted to the administrator of the victim calling their ISP and asking them to manually install filters to block the attack, an approach increasingly insufficient as attacks become more sophisticated. The intuitive response is to automate this process, i.e., enable the victim to automatically compute undesired-traffic signatures and send appropri...