Login / Signup
Utilizing bloom filters for detecting flooding attacks against SIP based services.
Dimitris Geneiatakis
Nikos Vrakas
Costas Lambrinoudakis
Published in:
Comput. Secur. (2009)
Keyphrases
</>
bloom filter
web services
data structure
network intrusion detection systems
security risks
service providers
countermeasures
record linkage
context aware
training data
end users
session initiation protocol
membership queries
detecting malicious