Sciweavers

507 search results - page 13 / 102
» Attacking DDoS at the Source
Sort
View
63
Voted
APPINF
2003
14 years 11 months ago
Design of an Autonomous Anti-DDoS (A2D2) Network
– The threat of DDoS attack are mainly directed at home and SOHO network that lacks the incentive, expertise, and financial means to defend themselves. This paper proposes an Aut...
Angela Cearns, C. Edward Chow
IAJIT
2010
96views more  IAJIT 2010»
14 years 8 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...
FTDCS
2004
IEEE
15 years 1 months ago
A New Perspective in Defending against DDoS
Distributed denial of service (DDoS) is a major threat to the availability of Internet services. The anonymity allowed by IP networking, together with the distributed, large scale...
Shigang Chen, Randy Chow
JSAC
2006
105views more  JSAC 2006»
14 years 9 months ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song
IM
2007
14 years 11 months ago
Interactive Informatics on Internet Infrastructure
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...