Y Xie, SZ Yu - IEEE/ACM Transactions on networking, 2008 - ieeexplore.ieee.org
… to detect DDoS attacks from three different layers: IP layer, TCP layer, and application layer.
… from the attack one. Here, we survey representative research from each perspective. Most …