A Method to Implement a Denial of Service Protection Base

Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be presented to specify and enforce a resource allocation policy to prevent denial of service attacks. Resource allocation policy can be formally derived from a waiting time policy where maximum acceptable response times for different processes are specified.

[1]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[2]  Donn B. Parker,et al.  A New Framework for Information Security to Avoid Information Anarchy , 1995 .

[3]  Roger M. Needham,et al.  Denial of service , 1993, CCS '93.

[4]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Virgil D. Gligor,et al.  A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.

[6]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[7]  Maryline Chetto,et al.  Some Results of the Earliest Deadline Scheduling Algorithm , 1989, IEEE Transactions on Software Engineering.

[8]  Yuliang Zheng,et al.  Layered Protection of Availability , 1997, PACIS.

[9]  Glenn H. MacEwen,et al.  A logic for reasoning about security , 1992, TOCS.

[10]  K. J. Keus,et al.  Availability: theory and fundamentals for practical evaluation and use , 1994, Tenth Annual Computer Security Applications Conference.