Whispering through DDoS attack

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Slow TCAM Exhaustion DDoS Attack

Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller. However, due to limitations on the number of forwarding rules a switch can store in its TCAM memory, SDN networks have been subject to saturatio...

متن کامل

DDoS attack detection and wavelets

This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic characterization with behavior modeling could be a good guidance of attack detection. Aggregated traffic has been found to be s...

متن کامل

IP Traceback Algorithm for DoS/DDoS Attack

DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do not support traceback to know attacker’s real location. Many methods to defend DoS/DDoS attack have been proposed. However these kinds of methods cause network overhead because they use many packets to reconstruct an attack path...

متن کامل

Preventing VANET From DOS & DDOS Attack

.VANET is an emerging technology; it is a special class of MANET. There are many challenges that must be addressed before it can be successfully deployed. In recent years, not much work is done in the field of security. For security, availability of network is must be obtained at every time since availability of the network is crucially needed when a node sends any important information to othe...

متن کامل

Comparison of Queuing Algorithms against DDoS Attack

In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Perspectives in Science

سال: 2016

ISSN: 2213-0209

DOI: 10.1016/j.pisc.2015.11.016