Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Shaker, Gholam"'
SYN-flooding attack uses the weakness available in TCP's three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increas
Externí odkaz:
http://arxiv.org/abs/1208.5037
Autor:
Jamali, Shahram, Shaker, Gholam
Publikováno v:
In Computers and Mathematics with Applications 2012 63(1):214-221