Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies

@inproceedings{Blackert2003AnalyzingIB,
  title={Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies},
  author={W. J. Blackert and D. M. Gregg and A. K. Castner and E. M. Kyle and R. L. Hom and R. M. Jokerst},
  booktitle={DISCEX},
  year={2003}
}
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/APL) has been conducting the Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA). DDOS-DATA’s goal is to analyze Distributed Denial of Service (DDOS) attacks and mitigation technologies to develop an understanding of how well mitigation technologies perform and how they can be combined to limit the… CONTINUE READING
Highly Cited
This paper has 54 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 37 extracted citations

An extensible platform for evaluating security protocols

38th Annual Simulation Symposium • 2005
View 3 Excerpts
Highly Influenced

Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol

2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE) • 2018
View 2 Excerpts

Utilizing Netflow Data to Detect Slow Read Attacks

2018 IEEE International Conference on Information Reuse and Integration (IRI) • 2018

Collaborative Distributed Protocol and Holistic Approach of Security in Wireless Sensor Networks

Eachanri 1 Rathinam Technical Campus, Coimbatore 2 Rathinam Technical Campus Rathinam Techzone, Rathinam Techzone Eachanri, Coimbatore
2017
View 1 Excerpt

DDOS attack in WSN: A survey

2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) • 2016
View 1 Excerpt

A review on existing security frameworks with efficient energy preservation techniques in Wireless Sensor Networks

2015 International Conference on Communications and Signal Processing (ICCSP) • 2015
View 3 Excerpts

54 Citations

0510'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 54 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Analysis of Denial of Service Attack on TCP

C. L. Schuba
2002

Characterizing stateful resource attacks using modeling and simulation,

D. M. Gregg, et. al
Quality and Reliability Engineering International (Wiley)18, • 2002
View 1 Excerpt

Similar Papers

Loading similar papers…