A DOS-based POset implementation

نویسنده

  • Frederick B. Cohen
چکیده

In this paper, we describe and discuss a DOS based POset (i.e. Partially Ordered Set) implementation. We begin with a short review of previous results on POset based protection. We then describe implementation details of POset based protection under DOS. Next we discuss management tools used to implement and control the protection system. Then we describe the problems encountered in integration into existing DOS environments and how automation is used to resolve these problems and keep management complexity low. Finally, we summarize results, draw conclusions, and describe further work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Querying Hierarchical Data in Very Large Databases

Hierarchical data, such as Partially Ordered Set (POSET) is tremendously used in relational databases, especially in data mining and data warehouse based-applications. Unfortunately, SQL (Structured Query Language) does not effectively support hierarchical data structure to manage this sort of data, for example, in Oracle, a CONNECT BY operator is used to query data organized into trees, howeve...

متن کامل

Research of SIP DoS Defense Mechanism Based on Queue Theory

The SIP is becoming the core of multimedia communication network through the IP, based on which the 3G network has been operated in our country. The easy implementation, high destruction and hard tracking against attacking source which are the characters of DoS attack cause the great security threat to SIP. Focusing on the research on defense mechanisms of DoS attacks in SIP protocol, this pape...

متن کامل

StopIt: Mitigating DoS Flooding Attacks from Multi-Million Botnets

This paper presents the design and implementation of a filter-based DoS defense system (StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the StopIt design is a novel closed-control, open-service architecture: any receiver can use StopIt to block the undesired traffic it receives, yet the design is robust to various strategic attacks from millions of bo...

متن کامل

Modeling Poset Convex Subsets

A subset S of a poset (partially ordered set) is convex if and only if S contains every poset element which is between any two elements in S. Poset convex subsets arise in applications that involve precedence constraints, such as in project scheduling, production planning, and assembly line balancing. We give a strongly polynomial time algorithm which, given a poset and element weights (of arbi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 10  شماره 

صفحات  -

تاریخ انتشار 1991