Back to Results
First PageMeta Content
Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing


A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
Add to Reading List

Document Date: 2004-04-16 10:35:25


Open Document

File Size: 162,91 KB

Share Result on Facebook

City

Goal / Preventive / /

Currency

USD / /

/

Event

Natural Disaster / /

Facility

Information Sciences Department University of Delaware Newark / /

IndustryTerm

Internet entity / Resource accounting mechanisms / intermediate networks / imaginative solutions / Internet resources / victim network / intrusion detection systems / Internet infrastructure / Internet operation / legitimate services / overall Internet security / worm defense systems / attack tools / exit router / security systems / non-critical services / good distributed solutions / Web-server-based worm / characterization tool / active applications / target network / firewall systems / Internet participants / given network / defense systems / Internet management / end networks / Web servers / software copies / large core routers / resource accounting / Web server vulnerability / bold claims that their solution / proxy server / intermediate network / Internet security / vulnerable software / upstream routers / subsequent Web pages / Internet design / Web server / realistic simulation tools / attack software / vulnerable Web browser / Internet design focuses / upstream networks / attacked core router / Internet chat program / /

OperatingSystem

XP / DoS / Microsoft Windows / /

Organization

UCLA / Smith Hall Computer and Information Sciences Department University of Delaware Newark / US National Science Foundation / army / DDoS / /

Person

Morris Worm / Jelena Mirkovic Peter Reiher / /

/

Position

Prime Minister / representative / /

Technology

TCP protocol / IPv6 / exit router / UDP / CGI / deployed protocols / misused protocols / Ethernet / deployed protocol / DNS / proxy server / firewall / HTTP / IPv4 / simulation / flash / Web server / /

SocialTag