Visualization analysis and design of DDoS attack

Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their relationship respectively. It provided users with di...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi-fan ZHANG, Xiao-ju DONG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00135
Tags: Add Tag
No Tags, Be the first to tag this record!