Maintaining Suspicious Flows using Cache Replacement under Flooding Attacks

碩士 === 國立臺灣科技大學 === 資訊管理系 === 103 === Network monitoring approaches have been popularly applied into networksproposed and developed throughout the years. However, the packet-based approach cannot easily be easily performed in at high-speeds networks, so . Therefore, researchers focusedstarted on inv...

Full description

Bibliographic Details
Main Authors: Shang-Ting Tsai, 蔡尚庭
Other Authors: Yuan-Cheng Lai
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/67987822495899340514