An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment

Over the last decade, Distributed Denial of Service (DDoS) attacks became one of the main Internet security issues and the weapon of choice for hackers, cyber extortionists, and cyber terrorists. A DDoS attack disrupts or degrades the network services (by depleting the network bandwidth or router pr...

Full description

Saved in:
Bibliographic Details
Main Author: Wisam H A.Muragaa
Format: Thesis
Language:English
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/c52883c3-3466-4ed2-8e79-e9e45a013994/download
https://oarep.usim.edu.my/bitstreams/546e8fe4-5da2-485b-a531-5014d6de79a8/download
https://oarep.usim.edu.my/bitstreams/2d57ed9e-4fda-4652-952e-788971558b06/download
https://oarep.usim.edu.my/bitstreams/40431fc9-ff97-4989-a101-3cd306a646fd/download
https://oarep.usim.edu.my/bitstreams/48473172-9023-4ffe-9e06-7759614b1a07/download
https://oarep.usim.edu.my/bitstreams/79dc738b-43ab-4c36-af5f-5b7a07e5b5d9/download
https://oarep.usim.edu.my/bitstreams/17a432eb-eaba-45be-bcc0-6e8a0bb1a13d/download
https://oarep.usim.edu.my/bitstreams/2f7baaa3-07da-4282-a640-0f9a6c2578c9/download
https://oarep.usim.edu.my/bitstreams/250715b0-2263-429e-9f53-726813d48961/download
https://oarep.usim.edu.my/bitstreams/9970b447-d948-4882-bb4f-efa1c1355828/download
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items