DDoS flooding attack detection through a step-by-step investigation


Internet users are increases, distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The threat posed by network attacks on large network, such as the internet… (More)
DOI: 10.1109/NESEA.2011.6144944


12 Figures and Tables


Citations per Year

Citation Velocity: 6

Averaging 6 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Cite this paper

@article{Jun2011DDoSFA, title={DDoS flooding attack detection through a step-by-step investigation}, author={Jae-Hyun Jun and Hyunju Oh and Sung-Ho Kim}, journal={2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications}, year={2011}, pages={1-5} }