Taming IP packet flooding attacks.
Karthik LakshminarayananDaniel AdkinsAdrian PerrigIon StoicaPublished in: Comput. Commun. Rev. (2004)
Keyphrases
- stepping stones
- ip address
- switched networks
- normal traffic
- ip addresses
- ip traffic
- ddos attacks
- internet protocol
- malicious traffic
- packet forwarding
- application layer
- network layer
- routing table
- countermeasures
- traffic analysis
- internet traffic
- ip networks
- watermarking scheme
- end to end
- differentiated services
- packet loss
- wireless networks
- high speed
- watermarking technique
- buffer size
- communication networks
- quality of service
- packet size
- end hosts