A DoS attack defense model adopting data mining

被引:0
|
作者
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China [1 ]
机构
来源
Dianzi Keji Diaxue Xuebao | 2008年 / 4卷 / 586-589期
关键词
Filtration - Internet protocols - Denial-of-service attack - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Accurate ICMP traceback model under DoS/DDoS attack
    Izaddoost, Alireza
    Othman, Mohamed
    Rasid, Mohd Fadlee A.
    ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2007, : 441 - +
  • [32] A Model of Overpowering a Multilevel Defense System by Attack
    Reshetov V.Y.
    Perevozchikov A.G.
    Lesik I.A.
    Computational Mathematics and Modeling, 2016, 27 (2) : 254 - 269
  • [33] Multilayered Attack-Defense Model on Networks
    Perevozchikov, A. G.
    Reshetov, V. Yu
    Yanochkin, I. E.
    COMPUTATIONAL MATHEMATICS AND MATHEMATICAL PHYSICS, 2019, 59 (08) : 1389 - 1397
  • [34] A comprehensive attack and defense model for the automotive domain
    Hutzelmann, Thomas
    Banescu, Sebastian
    Pretschner, Alexander
    SAE International Journal of Transportation Cybersecurity and Privacy, 2019, 2 (01): : 5 - 20
  • [35] An Attack–Defense Model with Inhomogeneous Resources of the Opponents
    A. G. Perevozchikov
    V. Yu. Reshetov
    I. E. Yanochkin
    Computational Mathematics and Mathematical Physics, 2018, 58 : 38 - 47
  • [36] Stack Overflow Based Defense for IPv6 Router Advertisement Flooding (DoS) Attack
    Goel, Jai Narayan
    Mehtre, B. M.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 299 - 308
  • [37] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 143 - 146
  • [38] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 233 - +
  • [39] Docker Security: A Threat Model, Attack Taxonomy and Real-Time Attack Scenario of DoS
    Tomar, Apama
    Jeena, Diksha
    Mishra, Preeti
    Bisht, Rahul
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 150 - 155
  • [40] A two-layer game theoretical attack-defense model for a false data injection attack against power systems
    Wang, Qi
    Tai, Wei
    Tang, Yi
    Ni, Ming
    You, Shi
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 104 : 169 - 177