DDoS flooding attack detection through a step-by-step investigation

Abstract

Internet users are increases, distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The threat posed by network attacks on large network, such as the internet… (More)
DOI: 10.1109/NESEA.2011.6144944

Topics

12 Figures and Tables

Statistics

01020201520162017
Citations per Year

Citation Velocity: 6

Averaging 6 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Cite this paper

@article{Jun2011DDoSFA, title={DDoS flooding attack detection through a step-by-step investigation}, author={Jae-Hyun Jun and Hyunju Oh and Sung-Ho Kim}, journal={2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications}, year={2011}, pages={1-5} }