Login / Signup
Tolerating denial-of-service attacks using overlay networks: impact of topology.
Ju Wang
Linyuan Lu
Andrew A. Chien
Published in:
SSRS@CCS (2003)
Keyphrases
</>
denial of service attacks
overlay network
peer to peer
structured peer to peer
publish subscribe
dos attacks
peer to peer file sharing
intrusion detection system
security threats
network topology
real time
bandwidth consumption
security issues
database
unsupervised learning
digital libraries
node failures
end hosts