Whispering through DDoS attack
نویسندگان
چکیده
منابع مشابه
Slow TCAM Exhaustion DDoS Attack
Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller. However, due to limitations on the number of forwarding rules a switch can store in its TCAM memory, SDN networks have been subject to saturatio...
متن کاملDDoS attack detection and wavelets
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic characterization with behavior modeling could be a good guidance of attack detection. Aggregated traffic has been found to be s...
متن کاملIP Traceback Algorithm for DoS/DDoS Attack
DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do not support traceback to know attacker’s real location. Many methods to defend DoS/DDoS attack have been proposed. However these kinds of methods cause network overhead because they use many packets to reconstruct an attack path...
متن کاملPreventing VANET From DOS & DDOS Attack
.VANET is an emerging technology; it is a special class of MANET. There are many challenges that must be addressed before it can be successfully deployed. In recent years, not much work is done in the field of security. For security, availability of network is must be obtained at every time since availability of the network is crucially needed when a node sends any important information to othe...
متن کاملComparison of Queuing Algorithms against DDoS Attack
In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Perspectives in Science
سال: 2016
ISSN: 2213-0209
DOI: 10.1016/j.pisc.2015.11.016