Techniques for Detecting and Preventing Denial of Service …
https://link.springer.com/chapter/10.1007/978-3-319-54978-1_21
Active Ids Response By changing filtering rules in routers and firewalls, IDSs can detect a “flooding” DoS attack. In this technique, IDSs use reconfigured related routers that stop an attack. However, there are several disadvantages to this method; e.g., all routers in an organization must be monitored by the IDS—a potentially expensive option. Filtering on a router ... Author: Hossein Zare, Mojgan Azadi, Peter Olsen Publish Year: 2018
By changing filtering rules in routers and firewalls, IDSs can detect a “flooding” DoS attack. In this technique, IDSs use reconfigured related routers that stop an attack. However, there are several disadvantages to this method; e.g., all routers in an organization must be monitored by the IDS—a potentially expensive option. Filtering on a router ...
Author: Hossein Zare, Mojgan Azadi, Peter Olsen
Publish Year: 2018
DA: 37 PA: 57 MOZ Rank: 55