Back to Results
First PageMeta Content
Network architecture / Denial-of-service attacks / Internet standards / IP traceback / Denial-of-service attack / Router / IP address spoofing / TCP global synchronization / Computer network security / Computing / Internet


 The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: doi:comjnl/bxl026 An
Add to Reading List

Document Date: 2006-06-27 09:05:07


Open Document

File Size: 610,61 KB

Share Result on Facebook

Company

Amazon / eBay / Oxford University Press / Yahoo / /

/

Event

Product Issues / Person Travel / Product Recall / /

Facility

The Chinese University of Hong Kong / /

IndustryTerm

programmable routers / traceback algorithm / adjacent routers / internal routers / proposed distributed algorithm / downstream routers / victim site / distributed algorithm / leaf router / local area networks / e - business / downstream router / regular services / possible applications / upstream router / information distribution services / upstream routers / immediate upstream routers / immediate downstream routers / correct accounting / border router / snapshot algorithm / Internet community / immediate upstream router / /

OperatingSystem

L3 / DoS / /

Organization

Chinese University of Hong Kong / British Computer Society / M. H. Wong Department of Computer Science and Engineering / Oxford University / /

Person

Let Ri / John C. S. Lui / /

/

Position

Corresponding author / Author / /

Product

victim site / Equation / DDoS application / DDoS / /

ProvinceOrState

Linkji / Link3 / Ri / /

Technology

proposed distributed algorithm / LAN / snapshot algorithm / border router / two routers / immediate upstream routers / immediate upstream router / MAC address / traceback algorithm / DDoS traceback algorithm / V. The algorithm / normal client Ri router / neighboring routers / downstream router / 423 ALGORITHM / immediate downstream routers / two adjacent routers / upstream router / Ethernet / distributed algorithm / leaf router / ISP / participating routers / simulation / local area networks / five routers / participating router / downstream routers / neighboring router / upstream routers / /

SocialTag