Back to Results
First PageMeta Content
Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing


A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018
Add to Reading List

Document Date: 2002-05-01 03:16:24


Open Document

File Size: 98,29 KB

Share Result on Facebook

Company

Microsoft / /

Event

Natural Disaster / FDA Phase / /

Facility

Peter Reiher Computer Science Department University of California / /

IndustryTerm

defense systems / resource accounting mechanisms / victim completely resilient to protocol / denial-ofservice tools / agent communications / Internet host / Web servers / upstream network / Internet resources / resource accounting / victim network / intrusion detection systems / proxy server / legitimacy-based systems / intermediate network / Internet hosts / higher-level protocols / victim services / communications channels / legitimate services / Internet security / upstream routers / Internet design / attack tools / denial-of-service tool / Web server / security systems / non-critical services / vulnerable protocols / reconfigurable overlay networks / resource replication services / Internet Architecture The Internet / firewall systems / /

OperatingSystem

DoS / /

Organization

DDoS / Peter Reiher Computer Science Department University / University of California / Los Angeles / army / /

Person

Morris Worm / Janice Martin / /

Position

representative / /

Product

mechanisms / /

ProvinceOrState

California / /

Technology

deployed protocols / deployed protocol / higher-level protocols / Packets comprising protocol / DNS / proxy server / firewall / HTTP / propagation mechanism Central Source Back-chaining Autonomous Protocol / UDP / TCP/IP / Web server / detection strategy Pattern Anomaly System Security Hybrid Protocol / CGI / /

SocialTag