|
Volumn , Issue , 2010, Pages 544-548
|
Attack simulation and signature extraction of low-rate DoS
|
Author keywords
Denial of service; Detection; Retransmission timeout; Threshold
|
Indexed keywords
ATTACK FLOW;
ATTACK TRAFFIC;
DENIAL OF SERVICE;
DOS ATTACKS;
RETRANSMISSION TIMEOUT;
SIGNATURE EXTRACTION;
TCP FLOWS;
TEST RESULTS;
COMPUTER CRIME;
INFORMATION SCIENCE;
INFORMATION TECHNOLOGY;
SECURITY OF DATA;
TRANSMISSION CONTROL PROTOCOL;
TELECOMMUNICATION TRAFFIC;
|
EID: 77952714082
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IITSI.2010.38 Document Type: Conference Paper |
Times cited : (9)
|
References (12)
|