Login / Signup
Identifying the Attack Source by IP Traceback.
K. C. Nalavade
B. B. Meshram
Published in:
ICT (2010)
Keyphrases
</>
ddos attacks
application layer
ip address
network layer
databases
countermeasures
web pages
multiple sources
detection mechanism
key exchange protocol