Login / Signup

Using a History-based Profile to Detect and Respond to DDoS Attacks.

Negar MosharrafAnura P. JayasumanaIndrakshi Ray
Published in: SECRYPT (2017)
Keyphrases
  • ddos attacks
  • application layer
  • network services
  • normal traffic
  • user profiles
  • dos attacks
  • denial of service attacks
  • information technology
  • forensic analysis