Detect the reflection amplification attack based on UDP protocol.
Chang LiuGang XiongJie LiuGaopeng GouPublished in: ChinaCom (2015)
Keyphrases
- tcp ip
- authentication protocol
- detection mechanism
- key exchange protocol
- denial of service attacks
- detection algorithm
- normal traffic
- transport layer
- detection method
- ip address
- automatic detection
- wireless networks
- network attacks
- lightweight
- application layer
- ip networks
- cryptographic protocols
- video streaming
- internet protocol
- mobile ip