IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004.
DOI: 10.1109/iscit.2004.1412917
|View full text |Cite
|
Sign up to set email alerts
|

Distributed denial of service detection using TCP/IP header and traffic measurement analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(20 citation statements)
references
References 7 publications
0
19
0
1
Order By: Relevance
“…Limwiwatkul's study discovered the DDoS attacking signature by analyzing TCP/IP packet headers against the well-defined rules and conditions, and distinguished the difference between normal and abnormal traffic [5]. The authors could obtain some sample signatures of the basic DDoS attack.…”
Section: Related Workmentioning
confidence: 99%
“…Limwiwatkul's study discovered the DDoS attacking signature by analyzing TCP/IP packet headers against the well-defined rules and conditions, and distinguished the difference between normal and abnormal traffic [5]. The authors could obtain some sample signatures of the basic DDoS attack.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, it was proven that data does not need to be stored in some cases, as it can be or even has to be processed in an on-line manner. Examples include the statistical detection of DDoS attacks [14] and solutions developed on field-programmable gate array (FPGA) cards [12].…”
Section: Flow Collectionmentioning
confidence: 99%
“…SOS network is able to change overlay topology dynamically to avoid DDoS and can survive in case that some key nodes are attacked. In [11], DDoS attacks were discovered by analyzing the TCP packet header against the well-defined rules and conditions and distinguished the difference between normal and abnormal traffic.…”
Section: Related Workmentioning
confidence: 99%