Sciweavers

28 search results - page 4 / 6
» Distributed Divide-and-Conquer Techniques for Effective DDoS...
Sort
View
LCN
2005
IEEE
15 years 3 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
ICDCS
2007
IEEE
15 years 3 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
DISCEX
2003
IEEE
15 years 2 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
LCN
2007
IEEE
15 years 3 months ago
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses
Abstract—We introduce a game-theoretic framework for reasoning about bandwidth attacks, a common form of distributed denial of service (DDoS) attacks. In particular, our traffic...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur