Preventing DDoS attacks by identifier/locator separation
暂无分享,去创建一个
Yi Lin | Hongke Zhang | Moshe Zukerman | Hongbin Luo | M. Zukerman | Hongke Zhang | Hongbin Luo | Yi Lin
[1] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.
[2] Hongke Zhang,et al. Decoupling the design of identifier-to-locator mapping services from identifiers , 2011, Comput. Networks.
[3] Wanlei Zhou,et al. Defending against Distributed Denial of Service , 2007, Encyclopedia of Information Ethics and Security.
[4] Dino Farinacci,et al. The Locator/ID Separation Protocol (LISP) , 2009, RFC.
[5] B. Brodsky,et al. Nonparametric Methods in Change Point Problems , 1993 .
[6] Yajuan Qin,et al. Identifier/locator separation: a worm detection and prevention perspective , 2011 .
[7] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[8] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.