Keyword : DDoS attack


A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack
Sanghun CHOI Yichen AN Iwao SASASE 
Publication:   
Publication Date: 2020/12/01
Vol. E103-D  No. 12 ; pp. 2600-2610
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
DDoS attackflooding attackbloom filter
 Summary | Full Text:PDF

On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks
Takanori KOMATSU Akira NAMATAME 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/10/01
Vol. E90-B  No. 10 ; pp. 2665-2672
Type of Manuscript:  Special Section PAPER (Special Section on New Challenge for Internet Technology and its Architecture)
Category: 
Keyword: 
DDoS attackcomplex networkbandwidth control
 Summary | Full Text:PDF

Collaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks
ByungHak SONG Joon HEO Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/10/01
Vol. E90-B  No. 10 ; pp. 2655-2664
Type of Manuscript:  Special Section PAPER (Special Section on New Challenge for Internet Technology and its Architecture)
Category: 
Keyword: 
IDSDDoS attackstatistical detectioncollaborative defensedetection threshold
 Summary | Full Text:PDF

An Effective DDoS Attack Detection and Packet-Filtering Scheme
Seokbong JEONG Hyunwoo KIM Sehun KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/07/01
Vol. E89-B  No. 7 ; pp. 2033-2042
Type of Manuscript:  PAPER
Category: Network Management/Operation
Keyword: 
DDoS attacknetwork securityqueuing modelpacket-filtering
 Summary | Full Text:PDF

Active Countermeasure Platform against DDoS Attacks
Dai KASHIWA Eric Y. CHEN Hitoshi FUJI Shuichi MACHIDA Hiroshi SHIGENO Ken-ichi OKADA Yutaka MATSUSHITA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/12/01
Vol. E85-D  No. 12 ; pp. 1918-1928
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
DDoS attacktraffic shapingactive networkpolicy-based shapingnetwork architecture
 Summary | Full Text:PDF