Tracer Placement with Limitation nodes in Protection Area
碩士 === 中華大學 === 資訊工程學系碩士班 === 99 === Distributed Denial of Service (DDoS) attacks become one of serious network security problems in recent years. To defend DDoS attacks effectively is to find attack origins first by enhanced routes referred to as tracers. Then attack traffic can be blocked by filte...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/33532800697451790321 |