메뉴 건너뛰기




Volumn , Issue , 2004, Pages 581-586

IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE (DOS); INTRUSION DETECTION ROUTER (IDR); PACKET CLASSIFICATION;

EID: 3543070612     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISPAN.2004.1300541     Document Type: Conference Paper
Times cited : (27)

References (19)
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM(CACM), 13(7):422-426, July 1970.
    • (1970) Communications of the ACM(CACM) , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 84862399669 scopus 로고    scopus 로고
    • National Laboratory for Applied Network Research (NLANR) http://dast.nlanr.net/Projects/Iperf, 2003.
    • (2003)
  • 7
    • 0020186366 scopus 로고
    • Designing a bloom filter for differential file access
    • September
    • Lee L. Gremillion. Designing a bloom filter for differential file access. Communications of the ACM (CACM), 25(9):600-604, September 1982.
    • (1982) Communications of the ACM (CACM) , vol.25 , Issue.9 , pp. 600-604
    • Gremillion, L.L.1
  • 9
    • 84862397790 scopus 로고    scopus 로고
    • Multi Router Traffic Grapher (MRTG) http://people.ee.ethz.ch/oetiker/ webtools/mrtg.
  • 10
    • 84862395626 scopus 로고    scopus 로고
    • Comoputer Emergency Response Team (CERT) http://www.cert.org.
  • 14
    • 0020805173 scopus 로고
    • A second look at bloom filters
    • August
    • James K. Mullin. A second look at bloom filters. Communications of the ACM (CACM), 26(8):570-571, August 1983.
    • (1983) Communications of the ACM (CACM) , vol.26 , Issue.8 , pp. 570-571
    • Mullin, J.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.