2020 Opto-Electronics and Communications Conference (OECC) 2020
DOI: 10.1109/oecc48412.2020.9273645
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Scheduling Strategy for Mitigating DDoS Attack in Edge Computing-enabled TWDM-PON

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…e motivations of DDoS attacks range from commercial competition to extortion and even political motives. ere are growing research interests on DDoS attacks, mainly including detecting DDoS attacks and mitigating DDoS attacks [1][2][3]. e biggest disadvantage of intrusion detection system (IDS), as a DDoS defense platform, is that IDS can only detect the attacks, but it does nothing to alleviate the attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…e motivations of DDoS attacks range from commercial competition to extortion and even political motives. ere are growing research interests on DDoS attacks, mainly including detecting DDoS attacks and mitigating DDoS attacks [1][2][3]. e biggest disadvantage of intrusion detection system (IDS), as a DDoS defense platform, is that IDS can only detect the attacks, but it does nothing to alleviate the attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%