DDoS Attack’s Simulation Using Legitimate and Attack Real Data Sets
暂无分享,去创建一个
Christopher Leckie | Monika Sachdeva | Ketki Arora | Krishan Kumar | C. Leckie | Krishan Kumar | M. Sachdeva | Ketki Arora
[1] David Moore,et al. The CoralReef Software Suite as a Tool for System and Network Administrators , 2001, LISA.
[2] Monika Sachdeva,et al. Impact Analysis of Recent DDoS Attacks , 2011 .
[3] Yonghua You,et al. A Defense Framework for Flooding-based DDoS Attacks , 2007 .
[4] C. Douligeris,et al. DDoS attacks and defense mechanisms: a classification , 2003, Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (IEEE Cat. No.03EX795).
[5] Gary C. Kessler,et al. Defenses Against Distributed Denial of Service Attacks , 2001 .
[6] Kuldip Singh,et al. DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..
[7] J. R. Scotti,et al. Available From , 1973 .
[8] Zhang Xiao-wei. Internet and Network Security , 2011 .
[9] Los Angeles,et al. D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks , 2003 .
[10] Philippe Owezarski. On the impact of DoS attacks on Internet traffic characteristics and QoS , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[11] Gurvinder Singh,et al. Measuring Impact of DDOS Attacks on , 2009 .
[12] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[13] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[14] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[15] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[16] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[17] Jan H. P. Eloff,et al. New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conference ... Federation for Information Processing) , 2007 .
[18] Vrizlynn L. L. Thing,et al. A Survey of Bots Used for Distributed Denial of Service Attacks , 2007, SEC.