Developing and Implementing IHPM on IXP425 Network Processor Platforms
碩士 === 國立中正大學 === 通訊工程研究所 === 93 === The sophisticated attackers always can compromise computers on the Internet and take them as their zombies launching DoS/DDoS attacks. They usually use forged source IP addresses in the attacking packets. This will conduce to be a difficult to handle task for sec...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09091897745313733020 |