Abstract | ||
---|---|---|
In the modern Internet, network anomalies are manifold and range from Distributed Denial of Service (DDoS) attacks over unsolicited
communication (e.g. Spam), to large-scale information harvesting. Network operators react by deploying carefully selected
monitoring equipment, tuned to protect their individual core assets. Consequently, there exist a multitude of different views
on the activities of a particular host at one moment in time, depending on the locally observed activity patterns, the configurations
of the monitoring equipment, and the policies and legislations which influence the amount of traffic information that can
be analyzed.
|
Year | DOI | Venue |
---|---|---|
2011 | 10.1007/978-3-642-20305-3_19 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
ddos attack,distributed denial of service | Secure multi-party computation,Multitude,Denial-of-service attack,Computer security,Computer science,Computer network,Alert level,Information Harvesting,Operator (computer programming),The Internet | Conference |
Volume | ISSN | Citations |
6613 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 2 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jacopo Cesareo | 1 | 5 | 1.15 |
Andreas Berger | 2 | 50 | 5.92 |
Alessandro D'Alconzo | 3 | 330 | 26.01 |