Sciweavers

507 search results - page 11 / 102
» Attacking DDoS at the Source
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...

Publication
96views
14 years 9 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou
CCS
2003
ACM
15 years 2 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
ACJ
2006
58views more  ACJ 2006»
14 years 9 months ago
Cooperative Defence Against DDoS Attacks
Guangsen Zhang, Manish Parashar