Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "DDoS attack"

ADD TO MY LIST
 
Countermeasure Tool - Carapace for Network Security

Author(s): Anand Bisen | Shrinivas Karwa | B.B. Meshram
A Peer-to-Peer Architecture to collaboratively Propagate and Traceback DDoS Attack information using DST

Author(s): D. Thamizh Selvam | P.S. Vinayagam | P. Syam Kumar | Dr. R. Subramanian
An Autonomous Framework for Early Detection of Spoofed Flooding Attacks

Author(s): Malliga Subramanian | Tamilarasi Angamuthu
DDoS Protections for SMTP Servers

Author(s): Michael Still & Eric C. McCreath
A Novel Distributed Detection Scheme against DDoS Attack

Author(s): Zaihong Zhou | Dongqing Xie | Wei Xiong
Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

Author(s): Li Zonglin | Hu Guangmin | Yao Xingmiao | Yang Dan
A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN

Author(s): Jatinder Singh, | Dr. Savita Gupta | Dr. Lakhwinder Kaur,
Dual-Level Defense Framework for DDoS Attacked Network

Author(s): Anjali Sardana | Ramesh C. Joshi
A survey of DDoS Service Attacks in Collaborative Intrusion Detection System

Author(s): J.Manikandan | S.Vijayaragavan | R.Madhavi
Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks

Author(s): Wei Ren | Hai Jin | Dit-Yan Yeung | Mei Yang
Network Topology Against Distributed Denial of Service Attacks

Author(s): S. Behin Sam | S. Sujatha | A. Kannan | P. Vivekanandan
A New Promising IP Traceback Approach and its Comparison with Existing Approaches

Author(s): V. Murali Bhaskaran | A.M. Natarajan | S.N. Sivanandam
A Maekawa Set Based Marking Scheme

Author(s): Zaihong Zhou | Dongqing Xie | Bingwang Jiao
Detecting and Preventing IP-spoofed Distributed DoS Attacks

Author(s): Yao Chen | Shantanu Das | Pulak Dhar | Abdulmotaleb El Saddik | Amiya Nayak
Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks

Author(s): Moon-Chuen Lee | Yi-Jun He | Zhaole Chen
Impact Analysis of Recent DDoS Attacks

Author(s): Ketki Arora | Krishan Kumar, | Monika Sachdeva
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks

Author(s): S.A.Arunmozhi | Y.Venkataramani
A Wide Scale Survey on Botnet

Author(s): Amit Kumar Tyagi | G.Aghila
Controlling IP Spoofing through PACKET Filtering

Author(s): Mridu Sahu | Rainey C. Lal
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
A Review of DDOS Attack and its Countermeasures in TCP Based Networks

Author(s): Akash Mittal | Ajit Kumar Shrivastava | Manish Manoria
McAfee SecurityCenter Evaluation under DDoS Attack Traffic

Author(s): Sirisha Surisetty | Student Member | Sanjeev Kumar
An Improved Dynamic Probabilistic Packet Marking for IP Traceback

Author(s): Qiao Yan | Xiaoming He | Tuwen Ning
SIMULATION OF THE COMBINED METHOD

Author(s): Ilya Levin | Victor Yakovlev
Stochastic Model of TCP SYN Attacks Stochastinis TCP SYN atakų modelis

Author(s): Simona Ramanauskaitė | Antanas Čenys
An Enhanced SYN Cookie Defence Method for TCP DDoS Attack

Author(s): Bo Hang | Ruimin Hu | Wei Shi
Improving DNS cache to alleviate the impact of DNS DDoS attack

Author(s): Wei-min LI | Xiao-guang CAO | Fang LIU | Zhen-ming LEI
A Distributed Approach to Defend Web Service from DDoS Attacks

Author(s): A Distributed Approach to Defend Web Service from DDoS Attacks
Mitigating App-DDoS Attacks on Web Servers

Author(s): Manisha M. Patil | U. L. Kulkarni
Research on the Active DDoS Filtering Algorithm Based on IP Flow

Author(s): Rui GUO | Hao YIN | Dongqi WANG | Bencheng ZHANG
IMPROVING QOS UNDER DDOS ATTACKS IN WIRELESS SENSOR NETWORKS USING ANT SYSTEM

Author(s): K.SANTHI SAGAR REDDY, | Dr. S. VARADARAJAN, | M.SUNIL KUMAR
Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

Author(s): Vivian Ogochukwu Nwaocha | Inyiama H.C.
MULTIHOMING ARCHITECTURE USED IN ATTACKING MAIL AND WEB SERVERS

Author(s): Kewal Krishan Sharma | Rakesh Dube
Flooding Distributed Denial of Service Attacks-A Review

Author(s): Khadijah W.M. Ghazali | Rosilah Hassan
Multi Directional Geographical Traceback with n Directions Generalization

Author(s): S. Karthik | V. P. Arunachalam | T. Ravichandran
A Novel Packet Marketing Method in DDoS Attack Detection

Author(s): Changhyun Beak | Junaid A. Chaudhry | Keonsoo Lee | Seungkyu Park | Minkoo Kim
Why do you need a reservation system?      Affiliate Program