2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.305
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Although flow monitoring loses a large amount of detailed information that is contained in the payload and headers of packets, it does capture the general traffic characteristics. These characteristics have proven to be highly useful for combating attacks such as worm propagation [21][22][23][40][41][42].…”
Section: Flow Monitoringmentioning
confidence: 99%
“…Although flow monitoring loses a large amount of detailed information that is contained in the payload and headers of packets, it does capture the general traffic characteristics. These characteristics have proven to be highly useful for combating attacks such as worm propagation [21][22][23][40][41][42].…”
Section: Flow Monitoringmentioning
confidence: 99%