1 |
DDoS Attack Response Guide for Small and Medium Businesses: [Internet]. Available: https://www.boho.or.kr/data/guideView.do?bulletin_writing_sequence =35135, 2019.
|
2 |
Kaspersky DDOS attacks in Q1 2017: [Internet]. Available: https://securelist.com/ddos-attacks-in-q1-2017/78285/, 2017.
|
3 |
M. Kuhrer, T. Hupperich, C. Rossow and T. Holz, "Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks," USENIX Workshop on Offensive Technologies, 2014.
|
4 |
H. Huang, L. Hu, J. Chu, and X. Cheng, "An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks," Institute of Electrical and Electronics Engineers, vol. 7, 2019
|
5 |
NTP Amplification DDoS Attack: [Internet]. Available: http://cve.mitre.org, 2013.
|
6 |
CVE-2006-0987 Learn more at National Vulnerability Database (NVD): [Internet]. Available: https://cve.mitre.org, 2006.
|
7 |
R.g Xu, J. Cheng, F. Wang, X. Tang, and J. Xu, "A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment," Symmetry, vol. 11, no. 1, Nov. 2019.
|
8 |
Web Server Traffic in Crisis Conditions: [Internet]. Available: https://lup.lub.lu.se/search/ws/files/6029596/625288.pdf, 2005.
|
9 |
N. Baik and N. Kang, "Multi-Phase Detection of Spoofed SYN Flooding attacks," International journal of Grid and Distributed Computing, vol. 11, no. 3, Mar. 2018.
|
10 |
TCP: [Internet]. Available: https://www.rfc-editor.org, 1981.
|