An Approach to Threats, Analysis and Avoidance of Wormhole Attacks
Abstract
Full Text:
PDFReferences
B. M. Leiner, V. G. Cerf, D. D. Clark, R. E. Kahn, L. Kleinrock, D. C. Lynch, J. Postel, L. G. Roberts and S. Wolff, “A Brief History of the Internet,” 2000. http://www.isoc.org/internet/history/brief.shtml
B. B. Gupta, R. C. Joshi and M. Misra, “Defending against Distributed Denial of Service Attacks: Issues and Challenges,” Information Security Journal: A Global Perspective, Vol. 18, No. 5, 2009, pp. 224-247.
C. Douligeris and A. Mitrokotsa “DDoS Attacks and Defense Mechanisms: Classification and State of the Art,” Elsevier Science Direct Computer Networks, Vol. 44, No. 5, 2004, pp. 643-666. doi: 10.1016/j.comnet.2003.10.003
D. Kravetz, “Anonymous Unfurls ‘Operation Titstorm’,” Wired Threat Level Blog, 2010.
J. Nazario, “Politically Motivated Denial of Service Attacks,” Arbor Networks, 2009.
DDoS-for-Hire Service Is Legal and Even Lets FBI Peek in, Says a Guy with an Attorney,” 2012. http://www.ddosdefense.net.
“Internet Creaks Following Cyber Attack on Spamhaus,” 2013. http://www.cbronline.com/news/security/internet-slows-d own-following-ddos-attack-on-spamhaus-280313
DOI: https://doi.org/10.23956/ijarcsse/V7I6/0193
Refbacks
- There are currently no refbacks.