Notes
- 1.
Technically, if an attack's primary purpose is to compromise a service, and, as a side effect, it crashes the service, this is not considered a DoS attack [3].
References
Aura, T., P. Nikander, and J. Leiwo (2000). “DoS resistant authentication with client puzzles.” Proc. of the Cambridge Security Protocols Workshop 2000.
Bellovin, S. (2002). “ICMP traceback messages.” Internet Draft. draft-ietf-itrace-02.txt
CERT Coordination Center (2001). “Denial of service attacks.” http://www.cert.org/tech_tips/denial_of_service.html
Dittrich, D. “Distributed denial of service (DDoS) attacks/tools.” http://staff.washington.edu/dittrich/misc/ddos/
Ioannidis, J. and S.M. Bellovin (2000). “Implementing pushback: Router-based defense against DDoS attacks.” Proc. of NDSS 2002.
Lemon, J. (2001). “Resisting SYN flood DoS attacks with a SYN cache.” http://people.freebsd.org/~jlemon/papers/syncache.pdf
Moore, D., G.M. Voelker, and S. Savage (2001). “Inferring internet denial-of-service activity.” Proc. of the 10th USENIX Security Symposium.
Savage, S., D. Wetherall, A. Karlin, and T. Anderson (2000). “Practical network support for IP traceback.” Proc. of ACM SIGCOMM 2000.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Cronin, E. (2005). Denial of Service. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_102
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_102
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering