A Study of DDOS (Distributed-denial-of- service) Attacks and Its Preventions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Investigating Distributed Denial of Service (DDoS) Attacks

Prevention of Distributed Denial of Service (DDoS) attacks before they achieve their intrusive objectives is a critical problem in network security. This is because the attacks rapidly build up and flood the networks with disruptive packets that consume network bandwidth within a short range of timestamp. Consequently, network activities are suddenly shutdown and legitimate users that are prese...

متن کامل

Distributed Denial of Service (DDoS) Attacks Detection Mechanism

Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that p...

متن کامل

Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning

As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none of these studies takes all the flags within TCP header into account, nor do th...

متن کامل

DDoS Traffic Verification Algorithm for Legitimate Clients Identification in Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) attacks have become a major threat to the stability of the internet and there is no satisfactory solution yet. These attacks are familiar threats to internet users for more than 10 years. Such attacks are carried out by a "bot-net", an army of zombie hosts spread around the internet, that overwhelm the bandwidth toward their victim web server, by s...

متن کامل

transference of imagery: a comparative formalistic study of shakespeares hamlet and its two persian translations

هدف از این تحقیق بررسی انتقال صور خیال هملت در دو ترجمه ی فارسی آن از نظر فرمالیستی بود. برای بدست آوردن داده-های مورد نیاز، 130 نمونه استعاره، مجاز، ایهام، کنایه و پارادوکس در متن اصلی مشخص شده و سپس بر اساس مدل نیومارک (1998) برای ترجمه ی استعاره یا بطور کلی زبان مجاز با معادل های فارسی شان مقایسه گردیدند. این تحقیق بر آن بود تا روش های استفاده شده برای ترجمه هر کدام از انواع زبان مجاز ذکر شد...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Scientific Research in Science, Engineering and Technology

سال: 2020

ISSN: 2394-4099,2395-1990

DOI: 10.32628/ijsrset207450