Sciweavers

507 search results - page 6 / 102
» Attacking DDoS at the Source
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
ICNS
2007
IEEE
14 years 1 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
ITIIS
2010
172views more  ITIIS 2010»
13 years 5 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
INFOSCALE
2006
ACM
14 years 1 months ago
Exploiting P2P systems for DDoS attacks
— When a P2P system has millions of concurrently active peers, there is the risk that it could serve as a DDoS engine for attacks against a targeted host. In this paper we descri...
Naoum Naoumov, Keith W. Ross
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 1 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque