Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints.
Frank Yeong-Sung LinYu-Shun WangYu-Pu WuChia-Yang HsuPublished in: AINA Workshops (2012)
Keyphrases
- quality of service
- malicious attacks
- network resources
- network conditions
- bandwidth allocation
- defense mechanisms
- resource utilization
- qos parameters
- resource reservation
- congestion control
- qos requirements
- application level
- ddos attacks
- multimedia services
- response time
- admission control
- ad hoc networks
- differentiated services
- path selection
- bandwidth utilization
- transmission rate
- next generation networks
- asynchronous transfer mode
- ip networks
- web services
- resource management
- real time
- service provisioning
- qos routing
- traffic engineering
- bandwidth requirements
- end to end qos
- end to end
- network structure
- network bandwidth
- network management
- wireless sensor networks
- distributed systems
- service differentiation
- video on demand
- qos aware
- intrusion detection
- mobile networks
- computer networks
- communication networks
- packet loss
- allocation scheme