منابع مشابه
Forensics of Random-UDP Flooding Attacks
Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks...
متن کاملDetecting SYN Flooding Attacks
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low computation overhead, which make the detec...
متن کاملCounteracting Active Attacks in Social Network Graphs
The growing popularity of social networks has generated interesting data analysis problems. At the same time, it has raised important privacy concerns, because social networks contain personal and sensitive information. Consequently, social graphs, which express the relations between the actors in a social network, ought to be sanitized or anonymized before being published. Most work on privacy...
متن کاملResisting Flooding Attacks on AODV
AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of throughput when malicious intruders flood the network with bogus route requests. We introduce a simple mechanism to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and...
متن کاملSYN Flooding Attacks in Mobile Adhoc Networks
Mobile Adhoc Networks (MANET) are special because of their self configuring and self maintenance capabilities. The highly dynamic network topology and the shared wireless medium are the main attractions and at the same time the main challenges of the MANET. These characters make MANET vulnerable to various attacks. There are several attacks on each layer of the protocol stack. Providing the sec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2020
ISSN: 2079-9292
DOI: 10.3390/electronics9081239