Response Methodology against Spoofed IP Attack using Active Networks Mechanism
Sang-Hyun Park, Haeng-Seok Ko, Oh-Seok Kwon, Journal of Internet Computing and Services, Vol. 9, No. 2, pp. 69-82, Apr. 2008
Full Text:
Keywords: Active network, Spoofed IP Attack, Attacker Isolation
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Park, S., Ko, H., & Kwon, O. (2008). Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9(2), 69-82.
[IEEE Style]
S. Park, H. Ko, O. Kwon, "Response Methodology against Spoofed IP Attack using Active Networks Mechanism," Journal of Internet Computing and Services, vol. 9, no. 2, pp. 69-82, 2008.
[ACM Style]
Sang-Hyun Park, Haeng-Seok Ko, and Oh-Seok Kwon. 2008. Response Methodology against Spoofed IP Attack using Active Networks Mechanism. Journal of Internet Computing and Services, 9, 2, (2008), 69-82.

