Map
Index
Random
Help
th

QuoteRef: pengT4_2007




Topic:
security leaks and weaknesses
Topic:
reliability of distributed systems
Topic:
limitations of system security

Reference

Peng, T., Leckie, C., Ramamohanarao, K., "Survey of network-based defense mechanisms countering the DoS and DDoS problems", ACM Computing Surveys, 39, 1, April 2007, pp. Article 3, 1-42. Google

Quotations
abstract ;;Quote: survey of denial of service attacks, Internet vulnerabilities, defense mechanisms, and countermeasures
7 ;;Quote: botnet software supports SYN flood, ICMP flood, HTTP flood, and denial of service configuration; update to maximize the similarity between attack trafic and normal traffic
38 ;;Quote: denial of service defense requires cooperation between ISPs to block malicious traffic near its source

Related Topics up

Topic: security leaks and weaknesses (67 items)
Topic: reliability of distributed systems (35 items)
Topic: limitations of system security (39 items)

Collected barberCB 7/07
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.