Proceedings ArticleDOI
When is service really denied?: a user-centric dos metric
Jelena Mirkovic,Alefiya Hussain,Brett Willson,Sonia Fahmy,Wei-Min Yao,Peter Reiher,Stephen Schwab,Roshan K. Thomas +7 more
- Vol. 35, Iss: 1, pp 357-358
TLDR
Several DoS impact metrics that measure the quality of service experienced by end users during an attack are proposed, and compare these measurements to application-specific thresholds.Abstract:
Denial-of-service (DoS) research community lacks accurate metrics to evaluate an attack's impact on network services, its severity and the effectiveness of a potential defense. We propose several DoS impact metrics that measure the quality of service experienced by end users during an attack, and compare these measurements to application-specific thresholds. Our metrics are ideal for testbed experimentation, since necessary traffic parameters are extracted from packet traces gathered during an experiment.read more
Citations
More filters
Proceedings ArticleDOI
How to Test DoS Defenses
TL;DR: This paper surveys existing approaches and criticizes their simplicity and the lack of realism, and concludes with guidelines on efficiently improving DoS evaluation, in the short and in the long term.
Dissertation
Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités
TL;DR: Cette etape nous a permis d'identifier les etats possibles du systeme en considerant le processus d'exploitation de the vulnerabilite et de definir quatre mesures relatives a l'etat del systeme.
Journal ArticleDOI
DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts
Jayaraj Poroor,Bharat Jayaraman +1 more
TL;DR: The authors identify a new class of denial-of-service attacks against RTMSs - indirect contention-in-hosts (ICiH), which attempts to indirectly degrade RTMS QoS by directing packets at other concurrent services, thereby inducing resource contention between RTMS packets and attack packets in the protocol stack.
ReportDOI
Benchmarks for Evaluation of Distributed Denial of Service (DDOS)
TL;DR: The main goal of the work was to develop the benchmark suite for evaluation of defenses against distributed denial-of-service (DDoS) attacks and found a common, intuitive and scientifically accurate measure of an attack s impact on network services in any given scenario.
References
More filters
Proceedings ArticleDOI
The effects of loss and latency on user performance in unreal tournament 2003
Tom Beigbeder,Rory Coughlan,Corey Charles Lusher,John Joseph Plunkett,Emmanuel Agu,Mark Claypool +5 more
TL;DR: This paper deduced typical real world values of packet loss and latency experienced on the Internet by monitoring numerous operational UT2003 game servers and designed maps that isolated the fundamental first person shooter interaction components of movement and shooting, and conducted numerous user studies under controlled network conditions.
Proceedings ArticleDOI
Quality is in the eye of the beholder: meeting users' requirements for Internet quality of service
TL;DR: It is shown that, while users' perceptions of World Wide Web QoS are influenced by a number of contextual factors, it is possible to correlate objective measures of QoS with subjective judgements made by users, and therefore influence system design.
Proceedings ArticleDOI
The effect of latency on user performance in Warcraft III
TL;DR: This work designs and conducts user studies that measure the impact of latency on user performance in Warcraft III, a popular RTS game, and finds modest statistical correlations between user performance and latency for exploration, but very weak correlations for building and combat.
Proceedings ArticleDOI
Experience with DETER: a testbed for security research
Terry Benzel,Robert Braden,Dongho Kim,Clifford Neuman,Anthony D. Joseph,Keith Sklower,Ron Ostrenga,Stephen Schwab +7 more
TL;DR: The DETER testbed provides unique resources and a focus of activity for an open community of academic, industry, and government researchers working toward better defenses against malicious attacks on the authors' networking infrastructure, especially critical infrastructure.
Proceedings ArticleDOI
Modeling networking protocols to test intrusion detection systems
Song Luo,Gerald A. Marin +1 more
TL;DR: In this paper, hybrid and heavy-tailed modeling techniques are used to build a detailed model of FTP including session arrivals, bytes transferred, and idle times, and the same techniques were used for other protocols including HTTP.