Sciweavers

507 search results - page 15 / 102
» Attacking DDoS at the Source
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 3 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
IWCMC
2010
ACM
15 years 2 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
77
Voted
IPPS
2005
IEEE
15 years 3 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
WWW
2009
ACM
15 years 10 months ago
Towards lightweight and efficient DDOS attacks detection for web server
In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...