Distributed Denial of Service Attack and DefenseDDoS Attack Detection
Distributed Denial of Service Attack and Defense: DDoS Attack Detection
Yu, Shui
2013-10-15 00:00:00
[In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/distributed-denial-of-service-attack-and-defense-ddos-attack-detection-TrZOd2J1Gu
Distributed Denial of Service Attack and DefenseDDoS Attack Detection
[In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.]
Published: Oct 15, 2013
Keywords: Network Traffic; Local Area Network; Network Flow; Edge Router; Packet Rate
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.