Scheduled Maintenance on January 26, 2015:
IEEE Xplore will be unavailable for approximately 1 hour starting at 10:30 AM ET. We apologize for the inconvenience.
By Topic

DDoS tolerant networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. The DDoS tolerant networks technology incorporates methods to detect, characterize, and respond to DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes. Preliminary results indicate that these methods can be effective against current attacks and suggest directions for improving detection of more stealthy attacks.

Published in:

DARPA Information Survivability Conference and Exposition, 2003. Proceedings  (Volume:2 )

Date of Conference:

22-24 April 2003