Defending against spoofed DDoS attacks with path fingerprint.

Fu-Yuan LeeShiuh-Pyng Shieh
Published in: Comput. Secur. (2005)
Keyphrases
  • ddos attacks
  • application layer
  • dos attacks
  • network services
  • denial of service attacks
  • forensic analysis
  • distributed denial of service
  • control system
  • fingerprint images
  • ip address