Back to Results
First PageMeta Content
Internet / Network architecture / Smurf attack / Trinoo / IP address spoofing / UDP flood attack / Tribe Flood Network / Stacheldraht / Traffic flow / Denial-of-service attacks / Computing / Denial-of-service attack


D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi
Add to Reading List

Document Date: 2002-01-24 19:27:00


Open Document

File Size: 396,04 KB

Share Result on Facebook

Company

CISCO / /

Event

Natural Disaster / /

IndustryTerm

detection systems / defense systems / source-end networks / source-end network / coordinated Internet / normal services / virus detection software / adjacent upstream router / normal Internet operation / intermediate networks / feasible solution / victim network / intermediate network / Internet hosts / Internet architecture / Internet Relay Chat / large networks / upstream routers / Internet core / intruder technology / attack tools / intermediate routers / legacy router / Web server / security systems / statistical processing / Internet users / online traffic statistics / Internet service / above systems / nonadjacent routers / target network / upstream router / /

OperatingSystem

Linux / /

Person

Prospectus Jelena Mirkovi / Peter Reiher January / /

Position

Advisor / system administrator / General / system scheduler / /

Technology

intermediate routers / encryption / upstream router / congested router / bad router / Linux / Distributed intruder technology / HTTP / UDP / TCP/IP / Web server / legacy router / upstream routers / adjacent upstream router / /

SocialTag