Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Disaster Recovery Sites as a Tool of Managing Extreme Attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Serrelis, E. ; Dept. of Informatics, Piraeus Univ. ; Alexandris, N.

This paper presents the use of overlay networks as a tool to confront the consequences of extreme network attacks. In particular, it suggests the use of disaster recovery sites, which are becoming a common practice of all major IT infrastructures. The main goals of this attempt are to enable IT infrastructures to deal with severe network attacks such as denial of service and distributed denial of service attacks as well as insider attacks

Published in:

Internet Surveillance and Protection, 2006. ICISP '06. International Conference on

Date of Conference:

26-28 Aug. 2006