메뉴 건너뛰기




Volumn , Issue , 2008, Pages 19-28

FOSeL: Filtering by helping an overlay security layer to mitigate DoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DROPS; FINANCIAL DATA PROCESSING; FLUID MECHANICS; SECURITY OF DATA; TECHNICAL PRESENTATIONS;

EID: 51749088327     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2008.23     Document Type: Conference Paper
Times cited : (16)

References (19)
  • 2
    • 4344701161 scopus 로고    scopus 로고
    • F. Depaoli and L. mariani. Dependability in peer-to-peer systems. IEEE Transaction on Internet Computing, 8(4):54-61, July and August 2004.
    • F. Depaoli and L. mariani. Dependability in peer-to-peer systems. IEEE Transaction on Internet Computing, 8(4):54-61, July and August 2004.
  • 4
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • January
    • P. Ferguson and D. Senie. Network ingress filtering: defeating denial of service attacks which employ ip source address spoofing. In Proceedings of the IETF,RFC2267, January 1998.
    • (1998) Proceedings of the IETF,RFC2267
    • Ferguson, P.1    Senie, D.2
  • 10
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • April
    • J. Mirkovic and P. Reither. A taxonomy of ddos attack and ddos defense mechanisms. ACM computer communication Review, 34(2), April 2004.
    • (2004) ACM computer communication Review , vol.34 , Issue.2
    • Mirkovic, J.1    Reither, P.2
  • 11
    • 0034776786 scopus 로고    scopus 로고
    • K. Park and H. Lee. on the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internet. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01), pages 15-26, 2001.
    • K. Park and H. Lee. on the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internet. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01), pages 15-26, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.