A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
An empirical analysis of target-resident dos filters
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
Numerous techniques have been proposed by which an end-system, subjected to a denial-of-service flood, filters the offending traffic. In this paper, we provide an empirical analysis of several such proposals, using traffic recorded at the border of a large network and including real DoS traffic. We focus our analysis on four filtering techniques, two based on the addresses from which the victim server typically receives traffic (static clustering and network-aware clustering), and two based on
doi:10.1109/secpri.2004.1301318
dblp:conf/sp/CollinsR04
fatcat:ab7btvvstzf5ldpssrziutsgq4