Login / Signup
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.
Udi Ben-Porat
Anat Bremler-Barr
Hanoch Levy
Published in:
INFOCOM (2008)
Keyphrases
</>
ddos attacks
defense mechanisms
denial of service attacks
network services
dos attacks
forensic analysis
peer to peer
ip address
application layer
buffer overflow
wireless sensor networks
cloud computing
network traffic
tcp ip
ip addresses
distributed denial of service