Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2014
DOI: 10.1109/icccnt.2014.6963043
View full text | Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…When all requirements are met, integrated infrastructure is created IDDI. Sahu et al (2014) present the system for network data filtering whose aim is to prevent DDOS. Network filter tracks data traffic from nodes, and if it detects that a node emits large quantity of data in short time intervals, it determines that the node is the attacker and discards its packets that are being sent to sink.…”
Section: • Victimmentioning
confidence: 99%
“…When all requirements are met, integrated infrastructure is created IDDI. Sahu et al (2014) present the system for network data filtering whose aim is to prevent DDOS. Network filter tracks data traffic from nodes, and if it detects that a node emits large quantity of data in short time intervals, it determines that the node is the attacker and discards its packets that are being sent to sink.…”
Section: • Victimmentioning
confidence: 99%
“…Denial of Service (DoS) or Distributed Denial of Service (DDoS). Malicious RTUs send random IP packets to the MTU in order to consume the system's resources with the final objective of making it inoperable [1,[29][30][31][32][33][34]].…”
mentioning
confidence: 99%