Denial of Service (DoS) Attacks using PART Rule and Decision Table Rule

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Denial of Service / Distributed Denial of Service MANAGING DoS ATTACKS

DISCLAIMER: To the extent permitted by law, this document is provided without any liability or warranty. Accordingly it is to be used only for the purposes specified and the reliability of any assessment or evaluation arising from it are matters for the independent judgment of users. This document is intended as a general guide only and users should seek professional advice as to their specific...

متن کامل

VPNshield: Protecing VPN Services from Denial-of-Service (DoS) Attacks

Employing survivability techniques developed by Architecture Technology Corporation (ATC) under the DARPA OASIS program, VPNshield implements DoSresistant (or survivable) VPNs that provide continuous, uninterrupted operation of VPN services in spite of access link flooding attacks. In contrast to existing infrastructurebased approaches for detecting and countering these attacks, the VPNshield a...

متن کامل

Rule Induction from a Decision Table Using Rough Sets Theory

Today, because of the rapid developments in both computer hardware and software industries, the increase in the storage capacities of huge databases, the data mining and the usage of the useful patterns that reside in the databases, became a very important research area. In parallel with the rapid increase in the data stored in the databases, effective use of the data is becoming a problem. To ...

متن کامل

Denial of Service Attacks

Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...

متن کامل

Denial of Service Attacks

................................................................................................................................................................4

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Electrical & Electronic Systems

سال: 2017

ISSN: 2332-0796

DOI: 10.4172/2332-0796.1000220