Back to Search Start Over

You can run, but you can't hide: an effective methodology to traceback DDoS attackers.

Authors :
Law, K.T.
Lui, J.C.S.
Yau, D.K.Y.
Source :
Proceedings 10th IEEE International Symposium on Modeling, Analysis & Simulation of Computer & Telecommunications Systems; 2002, p433-440, 8p
Publication Year :
2002

Details

Language :
English
ISBNs :
9780769518404
Database :
Complementary Index
Journal :
Proceedings 10th IEEE International Symposium on Modeling, Analysis & Simulation of Computer & Telecommunications Systems
Publication Type :
Conference
Accession number :
81256927
Full Text :
https://doi.org/10.1109/MASCOT.2002.1167105