Sciweavers

64 search results - page 13 / 13
» Detecting Flooding-Based DDoS Attacks
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Fit a Spread Estimator in Small Memory
—The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a...
MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Pei...
WORM
2004
14 years 11 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
INFOCOM
2009
IEEE
15 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
RAID
1999
Springer
15 years 2 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li