Login / Signup
A Hash-Based Path Identification Scheme for DDoS Attacks Defense.
Guang Jin
Fei Zhang
Yuan Li
Honghao Zhang
Jiangbo Qian
Published in:
CIT (2) (2009)
Keyphrases
</>
ddos attacks
defense mechanisms
dos attacks
denial of service attacks
distributed denial of service
hash functions
network services
forensic analysis
application layer
ip address
data mining techniques