<--- Back to Details
First PageDocument Content
Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing
Date: 2004-04-16 10:35:25
Cyberspace
Denial-of-service attack
IP address spoofing
SYN flood
UDP flood attack
Smurf attack
Firewall
Transmission Control Protocol
Internet security
Computer network security
Denial-of-service attacks
Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

Add to Reading List

Source URL: www.eecis.udel.edu

Download Document from Source Website

File Size: 162,91 KB

Share Document on Facebook

Similar Documents

Virtual reality / Technology / Information and communications technology / Culture / Cultural globalization / New media / Community building / Social information processing / Internet caf / Internet access / Internet / Barry Wellman

Is there a Place in Cyberspace: The Uses and Users of Public Internet Terminals1 Jeffrey Boase, Wenhong Chen, Barry Wellman, and Monica Prijatelj NetLab, Centre for Urban & Community Studies, University of Toronto This p

DocID: 1xUn3 - View Document

2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), and 2015 IEEE 12th International Conf on Emb

DocID: 1vqe7 - View Document

Cyberspace Law (Law 793) Final Exam

DocID: 1vo9w - View Document

Fall 2008 Cyberspace Law Syllabus

DocID: 1vkyW - View Document

Research Project AmSt 507 Ethics of US CyberWarfare Research Questions: The newest battlefield on planet Earth is in cyberspace. How does this change the rules of international warfare? Territo

DocID: 1vdUx - View Document