منابع مشابه
Protection Against DDoS Attacks Based On Traffic Level Measurements
— A method for protecting an Internet server against a bandwidth-consuming DDoS attack is proposed and analyzed. Incoming traffic is monitored continuously and " dangerous " traffic intensity rises are detected. Such an event activates a traffic filtering rule which pushes down the incoming aggregate traffic to an acceptable level by discarding excess packets according to the measured relative ...
متن کاملTrust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider. However, current DDoS detection and mitigation methods come at the cost of significantly increased trust in the cloud provider. In this paper we examine the security implications of denial-of-service prevent...
متن کاملProtection Against DDOS Using Secure Code Propagation In The VANETs
-VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven veh...
متن کاملOverDoSe: A Generic DDoS Protection Service Using an Overlay Network
We present the design and implementation of OverDoSe, an overlay network offering generic DDoS protection for targeted sites. OverDoSe clients and servers are isolated at the IP level. Overlay nodes route packets between a client and a server, and regulate traffic according to the server’s instructions. Through the use of light-weight security primitives, OverDoSe achieves resilience against co...
متن کاملUnified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks
Internet worms and DDoS attacks are considered the two most menacing attacks on today’s Internet. The traditional wisdom is that they are different beasts, and they should be dealt with independently. In this paper, however, we show that a unified rate limiting algorithm is possible, which effectively works on both Internet worms and DDoS attacks. The unified approach leads to higher worm traff...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016912251