Maintaining Suspicious Flows using Cache Replacement under Flooding Attacks
碩士 === 國立臺灣科技大學 === 資訊管理系 === 103 === Network monitoring approaches have been popularly applied into networksproposed and developed throughout the years. However, the packet-based approach cannot easily be easily performed in at high-speeds networks, so . Therefore, researchers focusedstarted on inv...
Main Authors: | Shang-Ting Tsai, 蔡尚庭 |
---|---|
Other Authors: | Yuan-Cheng Lai |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/67987822495899340514 |
Similar Items
-
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by: LeDoux, Charles
Published: (2017) -
Maintaining Web Cache Coherency
Published: (2000-01-01) -
Still Suspicious: The Suspicious-Coincidence Effect Revisited
by: Frank, M.C, et al.
Published: (2018) -
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.
by: Nhu-Ngoc Dao, et al.
Published: (2016-01-01) -
Probability based cache replacement algorithm for the hypervisor cache
by: Madhugiri Shamsundar, Abhiram
Published: (2013)