Login / Signup
Scalable network-layer defense against internet bandwidth-flooding attacks.
Katerina J. Argyraki
David R. Cheriton
Published in:
IEEE/ACM Trans. Netw. (2009)
Keyphrases
</>
network layer
ddos attacks
transport layer
application layer
ip address
computer networks
ip addresses
internet protocol
network security
streaming services
physical layer
video streaming
end to end
network architecture
real time
routing protocol
tcp ip
intrusion detection