2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 2014
DOI: 10.1109/icicict.2014.6781280
|View full text |Cite
|
Sign up to set email alerts
|

Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 4 publications
0
5
0
1
Order By: Relevance
“…In full-duplex mode, the system stably achieves twice the throughput of halfduplex mode and up to 19.738 Gbps, except test case of 64-Byte packets. than results claimed in [14] and [20]. We do partial reconfiguration (PR) experiments with two reconfigurable logic regions for the PIEF and HCF modules.…”
Section: Resultsmentioning
confidence: 91%
See 1 more Smart Citation
“…In full-duplex mode, the system stably achieves twice the throughput of halfduplex mode and up to 19.738 Gbps, except test case of 64-Byte packets. than results claimed in [14] and [20]. We do partial reconfiguration (PR) experiments with two reconfigurable logic regions for the PIEF and HCF modules.…”
Section: Resultsmentioning
confidence: 91%
“…Maheshwari et al [20] combined probabilistic and round trip time in Distributed Probabilistic HCF-Round trip time (DPHCF-RTT). Packets are checked once by intermediate DPHCF-RTT routers (nodes) and then they are forwarded to destinations.…”
Section: Related Workmentioning
confidence: 99%
“…Selain berasal dari dalam negeri atau cyber threats juga datang dari luar negeri. Namun, ancaman ini jarang mencapai taraf yang membutuhkan respon militer karena apapun yang dilakukan pemerintah dalam menanggapi ancaman cyber ini akan memiliki implikasi domestik dan internasional [1]. Pesatnya perkembangan teknologi informasi dan komunikasi ini merupakan tempat diletakkannya rahasiarahasia penting negara.…”
Section: Pendahuluanunclassified
“…PHCF technique [5] does not assure whether the unchecked packets are legitimate only. DPHCF-RTT technique [1] After reviewing the literature, it is found that CHCF, PHCF, DPHCF-RTT techniques, which are used to filter the spoofed packets from the total packets, possess certain limitations pertaining to low detection rate of spoofed packets. Hence, there exists lot of scope to maximize the detection rate of spoofed packets.…”
Section: Literature Reviewmentioning
confidence: 99%