Login / Signup

Identifying the Attack Source by IP Traceback.

K. C. NalavadeB. B. Meshram
Published in: ICT (2010)
Keyphrases
  • ddos attacks
  • application layer
  • ip address
  • network layer
  • databases
  • countermeasures
  • web pages
  • multiple sources
  • detection mechanism
  • key exchange protocol