메뉴 건너뛰기




Volumn 3989 LNCS, Issue , 2006, Pages 130-145

Misusing unstructured P2P systems to perform DoS attacks: The network that never forgets

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; KNOWLEDGE ACQUISITION; QUERY LANGUAGES; REAL TIME SYSTEMS; SERVERS; WORLD WIDE WEB;

EID: 33746660645     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767480_9     Document Type: Conference Paper
Times cited : (17)

References (10)
  • 3
    • 84941156189 scopus 로고    scopus 로고
    • Debian gnu/linux os. http://www.debian.org/.
  • 7
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • Vern Paxson. An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev., 31(3):38-47, 2001.
    • (2001) SIGCOMM Comput. Commun. Rev. , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 8
    • 33244474931 scopus 로고    scopus 로고
    • Characterizing the two-tier gnutella topology
    • Daniel Stutzbach and Reza Rejaie. Characterizing the two-tier gnutella topology. SIGMETRICS Perform. Eval. Rev., 33(1):402-103, 2005.
    • (2005) SIGMETRICS Perform. Eval. Rev. , vol.33 , Issue.1 , pp. 402-1103
    • Stutzbach, D.1    Rejaie, R.2
  • 10
    • 33746629116 scopus 로고    scopus 로고
    • Exploiting the security weaknesses of the gnutella protocol
    • Department of Computer Science, University of California
    • D. Zeinalipour-Yazti. Exploiting the security weaknesses of the gnutella protocol. Technical Report CS260-2, Department of Computer Science, University of California, 2001.
    • (2001) Technical Report , vol.CS260-2
    • Zeinalipour-Yazti, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.