Developing and Implementing IHPM on IXP425 Network Processor Platforms

碩士 === 國立中正大學 === 通訊工程研究所 === 93 === The sophisticated attackers always can compromise computers on the Internet and take them as their zombies launching DoS/DDoS attacks. They usually use forged source IP addresses in the attacking packets. This will conduce to be a difficult to handle task for sec...

Full description

Bibliographic Details
Main Authors: Ching-Fu Huang, 黃清富
Other Authors: Bo-Chao Cheng
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/09091897745313733020