Back to Results
First PageMeta Content
Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / Transmission Control Protocol / IP address spoofing / SYN flood / Traffic flow / Packet loss / Computer network security / Denial-of-service attacks / Computing


1 D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks Jelena Mirkovic, Member, IEEE, and Peter Reiher, Member, IEEE
Add to Reading List

Document Date: 2005-07-01 17:41:22


Open Document

File Size: 218,84 KB

Share Result on Facebook

Company

Red Hat / Intel Corporation / /

Event

Natural Disaster / /

IndustryTerm

streaming media / defense systems / per-packet processing / stub network / anomalous communications / Internet resources / per-packet processing cost / victim site / defense-deploying networks / Internet security / victim-end routers / connectionless protocol / exit router / transport protocol / attractive solution / Internet communications / distributed defense systems / chat applications / end network / voice over IP / /

OperatingSystem

FreeBSD / Red Hat Linux / Windows XP / Linux / Windows 2000 / FreeBSD 4.8 / /

Organization

Domain Name Service / /

Person

WARD D ESIGN / Peter Reiher / /

Position

agflow model for each application that uses UDP / /

Product

Linux / /

Technology

TCP protocol / underlying transport protocol / one protocol / UDP protocol / connectionless protocol / DNS / 5 Traffic statistics Agflow Table Connection Table Legitimate Connection List Classification SOURCE ROUTER / finite state machine / Linux / exit router / ISP / source router / streaming media / ICMP protocols / UDP / victim-end routers / operating systems / Network File System / VOIP / flash / IXP router / /

SocialTag