Marking-Based Source Identification Scheme for Defending Against DDoS Attacks
碩士 === 國立交通大學 === 資訊工程系 === 91 === Distributed Denial of Service (DDoS) attacks still threaten the Internet. The difficult part in defending against DDoS attacks is the source IP address of attack packets are spoofed. While defending against DDoS attacks, the most important point is to id...
Main Authors: | Kang-Hsien Chou, 周剛賢 |
---|---|
Other Authors: | Shiuh-Pyng Shieh |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/60366247919543570021 |
Similar Items
-
An Adaptive Approach for Defending against DDoS Attacks
by: Muhai Li, et al.
Published: (2010-01-01) -
A TTL-Included IP Marking Scheme Against DDoS Attack
by: Kuang-Chin Tuan, et al.
Published: (2004) -
Impact of Defending Strategy Decision on DDoS Attack
by: Chunming Zhang
Published: (2021-01-01) -
A Hierarchical Cooperative Defending System against DDoS Attacks
by: Po-Sheng Lin, et al.
Published: (2004) -
A Defense Scheme against Spoofed DDoS Attacks at the Source
by: Sheng-Hsuan Wang, et al.
Published: (2004)