2010
DOI: 10.7763/ijcee.2010.v2.148
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service Prevention Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 23 publications
0
28
0
Order By: Relevance
“…This software will continuously monitoring the TCP three-way handshake messages before the server reply. Router-based distributed packet filtering (DPF) mechanism [17] exploits routing information to determine if a packet arriving at the router is valid with respect to its inscribed source/destination addresses.…”
Section: IVmentioning
confidence: 99%
See 1 more Smart Citation
“…This software will continuously monitoring the TCP three-way handshake messages before the server reply. Router-based distributed packet filtering (DPF) mechanism [17] exploits routing information to determine if a packet arriving at the router is valid with respect to its inscribed source/destination addresses.…”
Section: IVmentioning
confidence: 99%
“…TCP SYN Flood attack is investigated in this paper. TCP SYN Flooding has remained one of the most destructive attack since September 1996; numerous sites on the internet have been effected by a TCP SYN Flood denial of service attack, prevalently termed SYN Flooding [2].…”
Section: Introductionmentioning
confidence: 99%
“…BGP routing information is used by RPF to filter traffic with spoofed source addresses. However, the filtering granularity of RPF is low [18].…”
Section: Related Workmentioning
confidence: 99%
“…As a result, it creates network congestion on the target, thus disrupting its normal Internet operation [1].…”
Section: Introductionmentioning
confidence: 99%