Sciweavers

64 search results - page 2 / 13
» Detecting Flooding-Based DDoS Attacks
Sort
View
ICPP
2007
IEEE
14 years 1 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
ICNS
2007
IEEE
14 years 1 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
ACSAC
2006
IEEE
14 years 1 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
ICCSA
2004
Springer
14 years 26 days ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
JPDC
2006
253views more  JPDC 2006»
13 years 7 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang