Topic: security leaks and weaknesses
Topic: reliability of distributed systems
Topic: limitations of system security
| |
Reference
Peng, T., Leckie, C., Ramamohanarao, K.,
"Survey of network-based defense mechanisms countering the DoS and DDoS problems",
ACM Computing Surveys, 39, 1, April 2007, pp. Article 3, 1-42.
Google
Quotations
abstract ;;Quote: survey of denial of service attacks, Internet vulnerabilities, defense mechanisms, and countermeasures
| 7 ;;Quote: botnet software supports SYN flood, ICMP flood, HTTP flood, and denial of service configuration; update to maximize the similarity between attack trafic and normal traffic
| 38 ;;Quote: denial of service defense requires cooperation between ISPs to block malicious traffic near its source
|
Related Topics
Topic: security leaks and weaknesses (67 items)
Topic: reliability of distributed systems (35 items)
Topic: limitations of system security (39 items)
|