2008
DOI: 10.1109/icact.2008.4494041
|View full text |Cite
|
Sign up to set email alerts
|

An On-line DDoS Attack Traceback and Mitigation System Based on Network Performance Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The intermediate respectively routers forward requests to further upstream intermediate routers to find the source of the flow. Furthermore, Su, Wu, Hsu, and Kuo [31], on the basis of the performance of the network introduced a traceback and mitigation method. The author claims that this is based on the monitoring packet loss and even the rate at which packets arrive.…”
Section: Entropy Based Mechanismsmentioning
confidence: 99%
“…The intermediate respectively routers forward requests to further upstream intermediate routers to find the source of the flow. Furthermore, Su, Wu, Hsu, and Kuo [31], on the basis of the performance of the network introduced a traceback and mitigation method. The author claims that this is based on the monitoring packet loss and even the rate at which packets arrive.…”
Section: Entropy Based Mechanismsmentioning
confidence: 99%
“…are proposed to trace the DDoS attack sources based on network performance monitoring [14]. A packet filter controller which adapts to queue length is proposed to mitigate the DDoS attack in this paper.…”
Section: Ddos Attack Traceback and Mitigation System (Datms)mentioning
confidence: 99%