Author:
Sood Shaurya,Palod Pritesh,Hubballi Neminath
Publisher
Springer Nature Switzerland
Reference19 articles.
1. https://www.cloudflare.com/en-in/learning/ddos/http-flood-ddos-attack/. Accessed 03 April 2022
2. Aqil, A., et al.: Detection of stealthy TCP-based dos attacks. In: MILCOM 2015–2015 IEEE Military Communications Conference, pp. 348–353 (2015)
3. Beckett, D., Sezer, S.: Http/2 cannon: Experimental analysis on http/1 and http/2 request flood DDOS attacks. In: EST 2017: Seventh International Conference on Emerging Security Technologies, pp. 108–113 (2017)
4. Carl, G., Kesidis, G., Brooks, R., Rai, S.: Denial-of-service attack-detection techniques. IEEE Internet Comput. 10(1), 82–89 (2006)
5. Core: (2019). https://httpd.apache.org/docs/2.4/mod/core.html. Accessed 28 April 2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献