Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks.
Roman ChertovSonia FahmyNess B. ShroffPublished in: ACM Trans. Model. Comput. Simul. (2008)
Keyphrases
- denial of service attacks
- dos attacks
- end hosts
- network simulator
- ddos attacks
- ns simulator
- intrusion detection system
- security threats
- packet switched
- computer networks
- mobile ad hoc networks
- network security
- communication networks
- network structure
- wireless sensor networks
- network management
- congestion control
- privacy preserving
- intrusion detection
- data mining
- network resources
- ip address
- peer to peer