2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380589
|View full text |Cite
|
Sign up to set email alerts
|

Simulation study of application layer DDoS attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The most serious and harmful attack is the denial of service (DoS) and its extension distributed denial of service (DDoS). DoS appeared in 1980, while the first report of DDoS appeared in 1995 [14,15]. Generally performing a DoS attack is simple and can be initiated on a solitary framework [16].…”
Section: Introductionmentioning
confidence: 99%
“…The most serious and harmful attack is the denial of service (DoS) and its extension distributed denial of service (DDoS). DoS appeared in 1980, while the first report of DDoS appeared in 1995 [14,15]. Generally performing a DoS attack is simple and can be initiated on a solitary framework [16].…”
Section: Introductionmentioning
confidence: 99%