Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Logical fiberings and polycontextural systems
FAIR '91 Proceedings of the International Workshop on Fundamentals of Artificial Intelligence Research
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Tracing Anonymous Packets to Their Approximate Source
LISA '00 Proceedings of the 14th USENIX conference on System administration
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
CIMCA '05 Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-1 (CIMCA-IAWTIC'06) - Volume 01
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
On the defense of the distributed denial of service attacks: an on-off feedback control approach
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
This paper presents the system FiberedGuard, which is an intelligent application for the prevention of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The main basis of FiberedGuard is a new data structure, which was inspired by Logical Fibering. Its advantages are flexibility, use of logical structures, interconnected global and local processing as well as simplicity to human interpretation. The alpha release of the system is currently being finalized. Results are obtained firstly in a separate laboratory structure until full approval. The system shall then be transported to the real world. The approach, which is novel, has the potential of revolutionizing the treatment of DoS and DDoS, substantially contributing to research in the area of security.