Contemporary society has grown increasingly reliant on information and the systems used to store, process, and communicate that information. Consequently very few aspects of modern-day life would continue to operate smoothly in the absence of functioning information and communications systems. This increasing societal dependence on information and communications technologies in general and communications networks in particular is most obvious when the delivery of services via these systems and networks is disrupted even for relatively short periods. Such situations in which access to networked services by legitimate customers or clients is deliberately disrupted are collectively categorised as ‘denial of service’ or DoS attacks. These are the subject of the ensuing discussion.


Internet Service Provider Legitimate User Domain Name System Base Transceiver Station Lightweight Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Carl, G., G. Kesidis, R.R. Brooks, and S. Rai. 2006. Denial-of-service attack – Detection techniques. IEEE Internet Computing 10(1): 82–89.CrossRefGoogle Scholar
  2. 2.
    Garber, L. 2000. Denial-of-service attacks rip the internet. Computer33(4): 12–17.CrossRefGoogle Scholar
  3. 3.
    Gligor, V.D., M. Blaze, and J. Ioannidis. 2000. Denial of service – Panel discussion. In Security Protocols Workshop, Lecture notes in computer science, vol. 2133, 194–203. Springer, Berlin.Google Scholar
  4. 4.
    Grice, C. 2000. How a basic attack crippled yahoo. http://news.cnet.com/2100-1023-236621.html. Accessed 16 Feb 2011.
  5. 5.
    Nazario, J. 2011. Political DDoS: Estonia and beyond (invited talk). In 17th USENIX Security Symposium, San Jose, July 2008. http://streaming.linux-magazin.de/events/usec08/tech/archive/jnazario/. Accessed 16 Feb 2011.
  6. 6.
    Singhal, A., T. Winograd, and K. Scarfone. 2007. Guide to Secure Web Services – Recommendations of the National Institute of Standards and Technology. National Institute of Standards and Technology, Gaithersburg.Google Scholar
  7. 7.
    Zuckerman, M.J. 2000. How the government failed to stop the world’s worst internet attack. USA Today, p. 1A.Google Scholar

Copyright information

© Springer India Pvt. Ltd. 2011

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia
  2. 2.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations