• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: DDoS ]" (6)
  1. 1. DDoS Attack Analysis Using the Improved ATMSim
    Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
    10.7472/jksii.2016.17.2.19
    Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack
  2. 2. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  3. 3. Anomaly Detection Mechanism against DDoS on BcN
  4. 4. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  5. 5. The intruder traceback mechanism based on active networks
    Lee Young-seok, Vol. 6, No. 1, pp. 1-12, Feb. 2005
    Keywords: DoS, DDoS, Active network, Traceback mechanism
  6. 6. Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack
    Lee Hyung-Woo, Vol. 5, No. 1, pp. 85-98, Feb. 2004
    Keywords: DDoS, Traceback, ICMP, ACC, Pushback