Visualization analysis and design of DDoS attack
Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with di...
Saved in:
Main Authors: | Yi-fan ZHANG, Xiao-ju DONG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
by: Zhiqiang Luo, et al.
Published: (2015-10-01) -
Optimal path identification to defend against DDoS attacks
by: JIN Guang1, et al.
Published: (2008-01-01) -
Model of coorperation defense DDoS attack based on client reputation
by: TIAN Jun-feng, et al.
Published: (2009-01-01) -
Study of a new packet marking scheme for DDoS attack source traceback
by: LI Jin-ming, et al.
Published: (2005-01-01) -
DDoS attack detection method based on conditional entropy and GHSOM in SDN
by: Junfeng TIAN, et al.
Published: (2018-08-01)