Tracer Placement with Limitation nodes in Protection Area

碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filte...

Full description

Bibliographic Details
Main Authors: Ven-Chen Cheng, 陳文誠
Other Authors: Chun-Hsin Wang
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/33532800697451790321