DDoS tools: Classification, analysis and comparison
暂无分享,去创建一个
Bharti Nagpal | Naresh Chauhan | Pratima Sharma | Angel Panesar | N. Chauhan | Pratima Sharma | Bharti Nagpal | Angel Panesar
[1] M Poongothai,et al. Simulation and analysis of DDoS attacks , 2012, 2012 International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET).
[2] Wenke Lee,et al. Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management , 2002, Journal of Network and Systems Management.
[3] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[4] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[5] Paul J Criscuolo,et al. Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319 , 2000 .
[6] Justin Zhijun Zhan,et al. Towards Defeating DDoS Attacks , 2012, 2012 International Conference on Cyber Security.
[7] S. Selvakumar,et al. Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms , 2009, 2009 IEEE International Advance Computing Conference.
[8] Jiang Feng,et al. The Research of DDoS Attack Detecting Algorithm Based on the Feature of the Traffic , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.