{"title":"考虑互联网协议中的拒绝服务","authors":"T. Aura","doi":"10.1109/CRIS.2009.5071490","DOIUrl":null,"url":null,"abstract":"Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Thinking about denial of service in Internet protocols\",\"authors\":\"T. Aura\",\"doi\":\"10.1109/CRIS.2009.5071490\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.\",\"PeriodicalId\":175538,\"journal\":{\"name\":\"2009 Fourth International Conference on Critical Infrastructures\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International Conference on Critical Infrastructures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CRIS.2009.5071490\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Critical Infrastructures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CRIS.2009.5071490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Thinking about denial of service in Internet protocols
Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.