An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment

Over the last decade, Distributed Denial of Service (DDoS) attacks became one of the main Internet security issues and the weapon of choice for hackers, cyber extortionists, and cyber terrorists. A DDoS attack disrupts or degrades the network services (by depleting the network bandwidth or router pr...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Wisam H A.Muragaa
التنسيق: أطروحة
اللغة:English
الموضوعات:
الوصول للمادة أونلاين:https://oarep.usim.edu.my/bitstreams/c52883c3-3466-4ed2-8e79-e9e45a013994/download
https://oarep.usim.edu.my/bitstreams/546e8fe4-5da2-485b-a531-5014d6de79a8/download
https://oarep.usim.edu.my/bitstreams/2d57ed9e-4fda-4652-952e-788971558b06/download
https://oarep.usim.edu.my/bitstreams/40431fc9-ff97-4989-a101-3cd306a646fd/download
https://oarep.usim.edu.my/bitstreams/48473172-9023-4ffe-9e06-7759614b1a07/download
https://oarep.usim.edu.my/bitstreams/79dc738b-43ab-4c36-af5f-5b7a07e5b5d9/download
https://oarep.usim.edu.my/bitstreams/17a432eb-eaba-45be-bcc0-6e8a0bb1a13d/download
https://oarep.usim.edu.my/bitstreams/2f7baaa3-07da-4282-a640-0f9a6c2578c9/download
https://oarep.usim.edu.my/bitstreams/250715b0-2263-429e-9f53-726813d48961/download
https://oarep.usim.edu.my/bitstreams/9970b447-d948-4882-bb4f-efa1c1355828/download
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!