Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Documents-> Security » Analyzing Large DDoS Attacks Using Multiple Data

This Directory TOP
joomlascan.py.txt
zfo3.txt
phpdj-rfi.txt
Cracking Password With Only Physical Access
sql-inject.pdf
sql-command.pdf
mxbb233-rfi.txt
Rootkits_final.zip
phpnukeplat-rfi.txt
Core02.pdf
ar38010.pdf
immunizing_the_internet.pdf
Phishing_DMosley.pdf
Spyware_and_The_Next_Level
ISMS_VKumar.pdf
phpjobscheduler-rfi.txt
YCS-2005-389.pdf
Chapter2.pdf
SEC314_Riley.pdf
Zfone_SSotillo.pdf
Mac OS X 10.4 Security Checklist
sslstrip-hijack.pdf
weaponizing-wireless.pdf
Advanced_Network_Exploitation_2009.pdf
H2HC-CFP-2006.txt
skype.txt
ms08_067_netapi.rb.txt
Frequency_HGantt.pdf
Security Analysis of Web Services - thesis
intelligent-debugging.pdf
cybercraft.pdf
Computer & Mind.pdf
Search

Analyzing Large DDoS Attacks Using Multiple Data

File Size: 309KB
Developer: http://www.eecs.umich.edu/~zmao/
Description:     We present a measurement study analyzing DDoS attacks from multiple data sources, relying on both direct measure- ments of low-level information, and more traditional indi- rect measurements using backscatter analysis. Understand- ing the nature of DDoS attacks is critically important to the development of effective counter measures to this press- ing problem. While much of the communitys current un- derstanding of DDoS attacks result from indirect measure- ments, our analysis suggests that such studies do not give a comprehensive view of DDoS attacks witnessed in todays Internet. Specifically, our results suggest little use of address spoofing by attackers, which imply that such attacks will be invisible to indirect backscatter measurement techniques. Further, at the detailed packet-level characterization (e.g., attack destination ports), there are significant diferences between direct and indirect measurements.
Download:   Analyzing Large DDoS Attacks Using Multiple Data

 

Sponsor Links

Sponsor Links

Share/Bookmark