نتایج جستجو برای: distributed denial of service attack

تعداد نتایج: 21214602  

Journal: :CoRR 2014
Madhulika Mool Prajyoti Sabale Sneha Parpelli Shalaka Chowriwar Nilesh Sambhe

Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks continue to threaten the reliability of networking systems. Previous approaches for protecting networks from DoS attacks are reactive in that they wait for an attack to be launched before taking appropriate measures to protect the network. This leaves the door open for other attacks that use more sophisticated methods to m...

Journal: :Journal of cyber security and mobility 2022

Cloud computing is considered as technical advancement in information technology. Many organizations have been motivated by this to outsource their data and computational needs. Such platforms are required fulfil basic security principles such confidentiality, availability, integrity. offers scalable virtualized services with a high flexibility level decreased maintenance costs end-users. The i...

2003
Sameer Ajmani Barbara Liskov Liuba Shrira

Upgrading the software of long-lived distributed systems is difficult. It is not possible to upgrade all the nodes in a system at once, since some nodes may be down and halting the system for an upgrade is unacceptable. This means that different nodes may be running different software versions and yet need to communicate, even though those versions may not be fully compatible. We present a meth...

2012
Sandford Bessler Eva Kühn Thomas Paulin

The realization of novel vehicular services requires a distributed computing and data management architecture in the roadside nodes. We illustrate the proposed architecture with a data transport service that can cope with connectivity disruptions, inherent to this kind of mobility. We discuss the results obtained by running the disruption tolerant service in a field trial on Austrian motorways.

Journal: :Electr. Notes Theor. Comput. Sci. 2003
David Teller

Failing to control resources in mobile, concurrent and distributed systems may lead to important breakdowns or Denial of Service-like attacks. In order to address this problem, we present enhanced versions of several calculi for mobile and distributed computing, namely NBA, Seals, Nomadic π and Kells. In each case, we make the formalism resource-conscious and define a type system in order to gu...

Journal: :CoRR 2010
Debajyoti Mukhopadhyay Byung-Jun Oh Sang-Heon Shim Young-Chon Kim

In this paper, we present a study on the recent approaches in handling Distributed Denial of Service (DDoS) attacks. DDoS attack is a fairly new type of attack to cripple the availability of Internet services and resources. A DDos attack can originate from anywhere in the network and typically overwhelms the victim server by sending a huge number of packets. Several remedial measures have been ...

Journal: :Computers & Security 2004
Li-Chiou Chen Thomas A. Longstaff Kathleen M. Carley

We propose a characterization of distributed denial-of-service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a framework for comparing the performance and deployment of DDOS defenses. We identify the characteristics in attack detection algorithms and attack responses by reviewing defenses that have appeared in the literature. ...

Journal: :Int. Journal of Network Management 2005
Yuh-Min Tseng

Malicious intruders may launch as many invalid requests as possible without establishing a server connection to bring server service to a standstill. This is called a denial-of-service (DoS) or distributed DoS (DDoS) attack. Until now, there has been no complete solution to resisting a DoS/DDoS attack. Therefore, it is an important network security issue to reduce the impact of a DoS/DDoS attac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید