Development of DDoS Attack Defense System Based on IKEv2 Protocol
Author:
Tan Qing,Yue Xiaojing
Reference6 articles.
1. Soussi, H., Hussain, M., Afifi, H., Seret, D.: IKEv1 and IKEv2: A quantitative analyses. The 4th World Enformatika Conference (2005) 2. Zhao, L., Li, X., Dong, Q., Shi, L.: An IKEv2 based security authentication scheme for mobile network. AISS 3(9), 191–198 (2011) 3. Kwok, Y.K., Tripathi, R., Chen, Y., Hwang, K.: HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. ICCNMC, pp. 423–432 (2005) 4. Yan, H., Wang, F., Cao, Z., Lin, F., Chen, C.: A novel method to defense against web DDoS. JDCTA 6(19), 162–170 (2012) 5. Fan, L., Zeng, W., Jiang, Y., Li, J., Liang, Q.: A group tracing and filtering tree for REST DDos in cloud. JDCTA 4(9), 212–224 (2010)
|
|