Sciweavers

JDCTA
2010
139views more  JDCTA 2010»
13 years 6 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
JPDC
2006
87views more  JPDC 2006»
13 years 11 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
ICCSA
2004
Springer
14 years 5 months ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee