Mechanism to continue system availability during cyber threat scenario
Abstract
References
Recommendations
Dynamical model for individual defence against cyber epidemic attacks
When facing the on‐going cyber epidemic threats, individuals usually set up cyber defences to protect their own devices. In general, the individual‐level cyber defence is considered to mitigate the cyber threat to some extent. However, few previous ...
Automatic control method of DDoS defense policy through the monitoring of system resource
AICT'11: Proceedings of the 2nd international conference on Applied informatics and computing theoryIn these day, we obtain various information through internet services and the distributed denial-of-service (DDoS) attacks for threatening the services are socially and economically serious threats. Recently, the attacks that occurred in July 2009 ...
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques
EISIC '11: Proceedings of the 2011 European Intelligence and Security Informatics ConferenceDisruption of service caused by distributed denial of services (DDoS) attacks is an increasing problem in the Internet world. At the present time, to attack the victim's system, the attacker uses sophisticated automated attacking tools for DDoS attack, ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 107Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in