Denial of Service: A Perspective

The scope of “denial-of-service protection” can be limited by comparing it and contrasting it with related concepts. The objectives and general concepts that drive current research have already been clarified to some extent by prior work. We summarize the general conclusions that have emerged, and assess their implications for the development of denial-of-service protection requirements and the guidance of future research.

[1]  Virgil D. Gligor,et al.  A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.

[2]  J. T. Haigh,et al.  Assured Service Concepts and Models. Volume 3. Availability in Distributed MLS Systems , 1992 .

[3]  Wei-Ming Hu,et al.  Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[5]  Ali Mili,et al.  Introduction to Program Fault Tolerance , 1990 .

[6]  Virgil D. Gligor,et al.  A Specification and Verification Method for Preventing Denial of Service , 1990, IEEE Trans. Software Eng..

[7]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[8]  Bev Littlewood How to Measure Software Reliability and How Not To , 1979, IEEE Transactions on Reliability.

[9]  Azer Bestavros,et al.  Specification and verification of real-time embedded systems using time-constrained reactive automata , 1991, [1991] Proceedings Twelfth Real-Time Systems Symposium.

[10]  John M. Boone,et al.  Integrity in Automated Information Systems , 1991 .

[11]  Nancy G. Leveson Verification of Safety , 1983 .

[12]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[13]  Ravi S. Sandhu Expressive Power of the Schematic Protection Model , 1992, J. Comput. Secur..

[14]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  John E. Dobson,et al.  Information and Denial of Service , 1991, Database Security.