Skip to main content
  • 191 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Technically, if an attack's primary purpose is to compromise a service, and, as a side effect, it crashes the service, this is not considered a DoS attack [3].

References

  1. Aura, T., P. Nikander, and J. Leiwo (2000). “DoS resistant authentication with client puzzles.” Proc. of the Cambridge Security Protocols Workshop 2000.

    Google Scholar 

  2. Bellovin, S. (2002). “ICMP traceback messages.” Internet Draft. draft-ietf-itrace-02.txt

    Google Scholar 

  3. CERT Coordination Center (2001). “Denial of service attacks.” http://www.cert.org/tech_tips/denial_of_service.html

  4. Dittrich, D. “Distributed denial of service (DDoS) attacks/tools.” http://staff.washington.edu/dittrich/misc/ddos/

  5. Ioannidis, J. and S.M. Bellovin (2000). “Implementing pushback: Router-based defense against DDoS attacks.” Proc. of NDSS 2002.

    Google Scholar 

  6. Lemon, J. (2001). “Resisting SYN flood DoS attacks with a SYN cache.” http://people.freebsd.org/~jlemon/papers/syncache.pdf

  7. Moore, D., G.M. Voelker, and S. Savage (2001). “Inferring internet denial-of-service activity.” Proc. of the 10th USENIX Security Symposium.

    Google Scholar 

  8. Savage, S., D. Wetherall, A. Karlin, and T. Anderson (2000). “Practical network support for IP traceback.” Proc. of ACM SIGCOMM 2000.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Cronin, E. (2005). Denial of Service. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_102

Download citation

Publish with us

Policies and ethics