作者: Minho Sung , Jun Xu
DOI: 10.1109/TPDS.2003.1233709
关键词: Application layer DDoS attack 、 Throughput 、 Edge device 、 Network topology 、 Denial-of-service attack 、 The Internet 、 Network packet 、 Computer security 、 IP traceback 、 Computer network 、 Computer science 、 Trinoo
摘要: … : dropping DDoS traffic with high probability while allowing most of the legitimate traffic to go … be able to statistically distinguish legitimate traffic from DDoS traffic. The proposed scheme …