Date: 2003-02-11 22:53:17Computer security Computing Denial-of-service attack Internet Relay Chat Data security IP address spoofing Transmission Control Protocol Traffic flow SYN flood Computer network security Denial-of-service attacks Cyberwarfare | | Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego [removed]Add to Reading ListSource URL: cs.unc.eduDownload Document from Source Website File Size: 198,70 KBShare Document on Facebook
|