Distributed Denial of Service Attacks

10/8/00


Click here to start


Table of Contents

Distributed Denial of Service Attacks

Roadmap

Introduction

Characteristics of distributed denial of service attacks

Elements of denial of service attacks

Steps that take place during an attack

Methods of denial of service attacks

Methods of distributed denial of service attacks

Methods of distributed denial of service attacks (cont.)

Defenses against attacks

Yahoo! attack

Yahoo! attack (cont.)

Network simulations

Simulation scenario

Queuing algorithms

Simulated network topologies

Simulation parameters

Drop Tail

Random Early Detection

Class Based Queuing (Packet by Packet Round Robin)

Performance results

Tradeoff

Conclusions

Conclusions (cont.)

References

Author: Felix Lau, Stuart H. Rubin, Michael H. Smith, and Ljiljana Trajkovic