Login / Signup
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots
K. Munivara Prasad
A. Rama Mohan Reddy
V. Jyothsna
Published in:
CoRR (2012)
Keyphrases
</>
distributed denial of service
ddos attacks
forensic analysis
ip address
application layer
ip addresses
denial of service attacks
dos attacks
end hosts
detecting malicious
web applications
normal traffic