Using Routing and Tunneling to Combat DoS Attacks.
Adam GreenhalghMark HandleyFelipe HuiciPublished in: SRUTI (2005)
Keyphrases
- dos attacks
- mobile ad hoc networks
- denial of service
- network security
- lightweight
- routing protocol
- denial of service attacks
- ddos attacks
- network topology
- ad hoc networks
- routing algorithm
- routing problem
- databases
- network traffic
- shortest path
- intrusion detection
- network attacks
- computer networks
- object recognition
- machine learning
- real time