Sciweavers

507 search results - page 22 / 102
» Attacking DDoS at the Source
Sort
View
CCS
2005
ACM
15 years 3 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
GLOBECOM
2009
IEEE
15 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
KIVS
2007
Springer
15 years 3 months ago
A System for in-Network Anomaly Detection
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
Thomas Gamer
CIMCA
2005
IEEE
15 years 3 months ago
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
This paper describes the system “Fibered Guard”, which is a hybrid intelligent web access management approach for the prevention of Denial of Service (DoS) and Distributed Deni...
Marvin Oliver Schneider, Jacques Calmet
INFOCOM
2005
IEEE
15 years 3 months ago
FIT: fast Internet traceback
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song