{"title":"针对网络设备的DoS攻击及应对措施","authors":"Qian Wang, Timothy Dunlap, Youngho Cho, G. Qu","doi":"10.1109/WOCC.2017.7928974","DOIUrl":null,"url":null,"abstract":"Denial of service (DoS) attacks have been one of the major network security problems over the last decades. DoS attacks can usually be mounted on hardware devices such as routers and firewalls to send spoofing messages to the target network. Thus, methods for defeating such DoS attacks are highly related to the vulnerabilities in the hardware devices. In this paper, we investigate the potential attacks specific to the hardware infrastructure of the network and also categorize the countermeasures against DoS attacks that can be implemented on hardware devices. Moreover, we analyze the advantages of the emerging silicon physical unclonable functions and discuss the potential of integrating them into authentication methods in order to defend against DoS attacks.","PeriodicalId":6471,"journal":{"name":"2017 26th Wireless and Optical Communication Conference (WOCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"DoS attacks and countermeasures on network devices\",\"authors\":\"Qian Wang, Timothy Dunlap, Youngho Cho, G. Qu\",\"doi\":\"10.1109/WOCC.2017.7928974\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Denial of service (DoS) attacks have been one of the major network security problems over the last decades. DoS attacks can usually be mounted on hardware devices such as routers and firewalls to send spoofing messages to the target network. Thus, methods for defeating such DoS attacks are highly related to the vulnerabilities in the hardware devices. In this paper, we investigate the potential attacks specific to the hardware infrastructure of the network and also categorize the countermeasures against DoS attacks that can be implemented on hardware devices. Moreover, we analyze the advantages of the emerging silicon physical unclonable functions and discuss the potential of integrating them into authentication methods in order to defend against DoS attacks.\",\"PeriodicalId\":6471,\"journal\":{\"name\":\"2017 26th Wireless and Optical Communication Conference (WOCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 26th Wireless and Optical Communication Conference (WOCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOCC.2017.7928974\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 26th Wireless and Optical Communication Conference (WOCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCC.2017.7928974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DoS attacks and countermeasures on network devices
Denial of service (DoS) attacks have been one of the major network security problems over the last decades. DoS attacks can usually be mounted on hardware devices such as routers and firewalls to send spoofing messages to the target network. Thus, methods for defeating such DoS attacks are highly related to the vulnerabilities in the hardware devices. In this paper, we investigate the potential attacks specific to the hardware infrastructure of the network and also categorize the countermeasures against DoS attacks that can be implemented on hardware devices. Moreover, we analyze the advantages of the emerging silicon physical unclonable functions and discuss the potential of integrating them into authentication methods in order to defend against DoS attacks.