English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4201229      Online Users : 943
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/24835


    Title: Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues
    Authors: Lin, C.-H.;Lin, H.-Y.;Wu, T.-W.;Chen, Y.-H.;Huang, C.-H.
    Contributors: Department of Computer Science, Tunghai University
    Keywords: DDoS attack;Double Check Priority Queue;Malware;Network Simulator;Traffic analysis
    Date: 2013
    Issue Date: 2014-05-30T03:07:59Z (UTC)
    Abstract: Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services. ? 2011 Springer-Verlag.
    Relation: Journal of Ambient Intelligence and Humanized Computing,Vol.4,Issue2,P.275-282
    Appears in Collections:[資訊工程學系所] 期刊論文

    Files in This Item:

    There are no files associated with this item.



    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback