Sciweavers

64 search results - page 4 / 13
» Detecting Flooding-Based DDoS Attacks
Sort
View
IWNAS
2008
IEEE
15 years 8 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
86
Voted
IEICET
2007
91views more  IEICET 2007»
15 years 1 months ago
Collaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks
ByungHak Song, Joon Heo, Choong Seon Hong
JSAC
2006
165views more  JSAC 2006»
15 years 1 months ago
ALPi: A DDoS Defense System for High-Speed Networks
Distributed denial-of-service (DDoS) attacks pose a significant threat to the Internet. Most solutions proposed to-date face scalability problems as the size and speed of the netwo...
P. E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong...
109
Voted
NCA
2003
IEEE
15 years 7 months ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
CCS
2007
ACM
15 years 8 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...