Response Methodology against Spoofed IP Attack using Active Networks Mechanism
Sang-Hyun Park, Haeng-Seok Ko, Oh-Seok Kwon, Journal of Internet Computing and Services, Vol. 9, No. 2, pp. 69-82, Apr. 2008
Full Text:
Keywords: Active network, Spoofed IP Attack, Attacker Isolation
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Park, S., Ko, H., & Kwon, O. (2008). Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9(2), 69-82.
[IEEE Style]
S. Park, H. Ko, O. Kwon, "Response Methodology against Spoofed IP Attack using Active Networks Mechanism," Journal of Internet Computing and Services, vol. 9, no. 2, pp. 69-82, 2008.
[ACM Style]
Sang-Hyun Park, Haeng-Seok Ko, and Oh-Seok Kwon. 2008. Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9, 2, (2008), 69-82.