메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A more accurate scheme to detect SYN flood attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 70349673966     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2009.5072099     Document Type: Conference Paper
Times cited : (6)

References (9)
  • 2
    • 70349695903 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and common mitigations
    • [Online]. Available
    • W. Eddy, "TCP SYN flooding attacks and common mitigations," RFC 4987, 2007. [Online]. Available: http://www.rfc-editor.org/rfc/rfc4987.txt
    • (2007) RFC 4987
    • Eddy, W.1
  • 6
    • 33947507304 scopus 로고    scopus 로고
    • On scalable attack detection in the network
    • R. Kompella, S. Singh, and G. Varghese, "On scalable attack detection in the network," IEEE/ACM Trans. Networking, vol. 15, no. 1, pp. 14-25, 2007.
    • (2007) IEEE/ACM Trans. Networking , vol.15 , Issue.1 , pp. 14-25
    • Kompella, R.1    Singh, S.2    Varghese, G.3
  • 7
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder and M. Mitzenmacher, "Network applications of Bloom filters: a survey," Internet Mathematics, vol. 1, no. 4, pp. 485-509, 2004.
    • (2004) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 8
    • 70349675245 scopus 로고    scopus 로고
    • [Online]. Available:
    • "equinix-chicago monitor Realtime reports," 2008. [Online]. Available: http://www.caida.org/data/passive/monitors/equinix-chicago.xml
    • (2008) Equinix-Chicago Monitor Realtime Reports


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.