In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
CITATION STYLE
Yu, S. (2014). DDoS attack detection. In SpringerBriefs in Computer Science (Vol. 0, pp. 31–53). Springer. https://doi.org/10.1007/978-1-4614-9491-1_3
Mendeley helps you to discover research relevant for your work.