scispace - formally typeset
Proceedings ArticleDOI

When is service really denied?: a user-centric dos metric

TLDR
Several DoS impact metrics that measure the quality of service experienced by end users during an attack are proposed, and compare these measurements to application-specific thresholds.
Abstract
Denial-of-service (DoS) research community lacks accurate metrics to evaluate an attack's impact on network services, its severity and the effectiveness of a potential defense. We propose several DoS impact metrics that measure the quality of service experienced by end users during an attack, and compare these measurements to application-specific thresholds. Our metrics are ideal for testbed experimentation, since necessary traffic parameters are extracted from packet traces gathered during an experiment.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

How to Test DoS Defenses

TL;DR: This paper surveys existing approaches and criticizes their simplicity and the lack of realism, and concludes with guidelines on efficiently improving DoS evaluation, in the short and in the long term.
Dissertation

Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités

TL;DR: Cette etape nous a permis d'identifier les etats possibles du systeme en considerant le processus d'exploitation de the vulnerabilite et de definir quatre mesures relatives a l'etat del systeme.
Journal ArticleDOI

DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts

TL;DR: The authors identify a new class of denial-of-service attacks against RTMSs - indirect contention-in-hosts (ICiH), which attempts to indirectly degrade RTMS QoS by directing packets at other concurrent services, thereby inducing resource contention between RTMS packets and attack packets in the protocol stack.
ReportDOI

Benchmarks for Evaluation of Distributed Denial of Service (DDOS)

TL;DR: The main goal of the work was to develop the benchmark suite for evaluation of defenses against distributed denial-of-service (DDoS) attacks and found a common, intuitive and scientifically accurate measure of an attack s impact on network services in any given scenario.
References
More filters
Proceedings ArticleDOI

The effects of loss and latency on user performance in unreal tournament 2003

TL;DR: This paper deduced typical real world values of packet loss and latency experienced on the Internet by monitoring numerous operational UT2003 game servers and designed maps that isolated the fundamental first person shooter interaction components of movement and shooting, and conducted numerous user studies under controlled network conditions.
Proceedings ArticleDOI

Quality is in the eye of the beholder: meeting users' requirements for Internet quality of service

TL;DR: It is shown that, while users' perceptions of World Wide Web QoS are influenced by a number of contextual factors, it is possible to correlate objective measures of QoS with subjective judgements made by users, and therefore influence system design.
Proceedings ArticleDOI

The effect of latency on user performance in Warcraft III

TL;DR: This work designs and conducts user studies that measure the impact of latency on user performance in Warcraft III, a popular RTS game, and finds modest statistical correlations between user performance and latency for exploration, but very weak correlations for building and combat.
Proceedings ArticleDOI

Experience with DETER: a testbed for security research

TL;DR: The DETER testbed provides unique resources and a focus of activity for an open community of academic, industry, and government researchers working toward better defenses against malicious attacks on the authors' networking infrastructure, especially critical infrastructure.
Proceedings ArticleDOI

Modeling networking protocols to test intrusion detection systems

TL;DR: In this paper, hybrid and heavy-tailed modeling techniques are used to build a detailed model of FTP including session arrivals, bytes transferred, and idle times, and the same techniques were used for other protocols including HTTP.
Related Papers (5)