Sciweavers

50 search results - page 1 / 10
» Source-End DDoS Defense
Sort
View
100
Voted
NCA
2003
IEEE
15 years 6 months ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher
CCR
2004
164views more  CCR 2004»
15 years 19 days ago
A taxonomy of DDoS attack and DDoS defense mechanisms
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents tw...
Jelena Mirkovic, Peter L. Reiher
112
Voted
CN
2004
124views more  CN 2004»
15 years 19 days ago
DDoS attacks and defense mechanisms: classification and state-of-the-art
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today
Christos Douligeris, Aikaterini Mitrokotsa
JSAC
2006
165views more  JSAC 2006»
15 years 22 days ago
ALPi: A DDoS Defense System for High-Speed Networks
Distributed denial-of-service (DDoS) attacks pose a significant threat to the Internet. Most solutions proposed to-date face scalability problems as the size and speed of the netwo...
P. E. Ayres, H. Sun, H. Jonathan Chao, Wing Cheong...
81
Voted
JSAC
2006
105views more  JSAC 2006»
15 years 22 days ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song