Principles of Quantum Computation

N/ACitations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Denial of Service attacks have become a weapon for extortion andvandalism causing damages in the millions of dollars to commercial andgovernment sites. Legal prosecution is a powerful deterrent, butrequires attribution of attacks, currently a difficult task. In thispaper we propose a method to \emph{automatically fingerprint} and\emph{identify} repeated attack scenarios---a combination of attackinghosts and attack tool. Such fingerprints not only aid in attributionfor criminal and civil prosecution of attackers, but also help justifyand focus response measures. Since packet contents can be easilymanipulated, we base our fingerprints on the \emph{spectralcharacteristics} of the attack stream which are hard to forge. Wevalidate our methodology by applying it to real attacks captured at aregional ISP and comparing the outcome with header-basedclassification. Finally, we conduct controlled experiments toidentify and isolate factors that affect the attack fingerprint.

Cite

CITATION STYLE

APA

Principles of Quantum Computation. (2007). In Fundamentals of Quantum Optics and Quantum Information (pp. 251–279). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-34572-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free