Sciweavers

6 search results - page 1 / 2
» Taming IP packet flooding attacks
Sort
View
CCR
2004
66views more  CCR 2004»
13 years 4 months ago
Taming IP packet flooding attacks
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TPDS
2008
130views more  TPDS 2008»
13 years 4 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
GLOBECOM
2009
IEEE
13 years 8 months ago
Protecting SIP against Very Large Flooding DoS Attacks
—The use of the Internet for VoIP communications has seen an important increase over the last few years, with the Session Initiation Protocol (SIP) as the most popular protocol u...
Felipe Huici, Saverio Niccolini, Nico d'Heureuse
ICPADS
2005
IEEE
13 years 10 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
13 years 11 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque