THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 90 |
Dung lượng | 4,15 MB |
Nội dung
Ngày đăng: 18/01/2021, 13:33
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
20. Cisco, Defining Strategies to Protect Against TCP SYN Denial of Service Attacks,http://cio.cisco.com/warp/public/707/4.html | Link | |
1. B. E. Brodsky and B. S. Darkhovsky (1993), Nonparametric Methods in Change- point Problems, Kluwer Academic Publishers, pp. 78-90 | Khác | |
2. Christos Douligeris and Aikaterini Mitrokotsa (2003), DDoS Attacks And Defense Mechanisms: A Classification, Signal Processing and Information Technology | Khác | |
3. Jelena Mirkovic, Janice Martin and Peter Reiher (2004), A Taxonomy of DDoS Attacks andDDoSDefenseMechanisms, ACM SIGCOMM Computer Communication Review | Khác | |
4. Jameel Hashmi, Manish Saxena, and Rajesh Saini (2012), Classification of DDoS AttacksandtheirDefenseTechniquesusingIntrusionPreventionSystem,InternationalJournalofComputerScience&Communication Networks | Khác | |
5. Jelena Mikovic, G.Prier and P.Reiher (2002), Attacking DdoS at the source, Proceedings of ICNP | Khác | |
6. Jelena Mikovic, G.Prier and P.Reiher (2002), A Taxonomy of DdoS Attacks and DdoS Defense Mechanisms , UCLA CSD Technical Report no. 020018 | Khác | |
7. Jelena Mikovic, G.Prier and P.Reiher (2002), Source Router Approach to DdoS Defense – UCLA CSD Technical Report no. 010042 | Khác | |
8. Kanwal Garg, Rshma Chawla (2011), Detection Of DDoS Attacks Using Data Mining, International Journal of Computing and Business Research | Khác | |
9. K.Park and H. Lee.(2001), On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In Proceedings of ACM SIGCOMM | Khác | |
10. Mbabazi Ruth Reg. No (2005), Victim-based defense against IP packet flooding denial of service attacks | Khác | |
11. Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita (2013), Detecting DistributedDenialofService Attacks: Methods, Tools and Future Directions, The Computer Journal | Khác | |
12. Mohammed Alenezi (2012), Methodologies for detecting DoS/DDoS attacks against network servers,TheSeventhInternational Conference on Systems and Networks Communications - ICSNC | Khác | |
13. Rajkumar, Manisha Jitendra Nene (2013), A Survey on Latest DoS Attacks Classification andDefenseMechanisms,International Journal of Innovative Research in Computer and CommunicationEngineering | Khác | |
14. Saman Taghavi Zargar, James Joshi, Member and David Tippe (2013), A Survey of DefenseMechanismsAgainstDistributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials | Khác | |
17. Tony Scheid (2011), DDoS Detection and Mitigation Best Practices, Arbor Networks | Khác | |
18. T. Peng, C. Leckie, and K. Ramamohanarao (2003), Detecting distributed denial of service attacks, using source ip address monitoring | Khác |
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN