نتایج جستجو برای: flooding attacks
تعداد نتایج: 70542 فیلتر نتایج به سال:
A Dynamic wireless network which is composed without any actual infrastructure is a mobile ad-hoc network (MANET). Every potential node in the network deports as a router. These mobile networks are much more vulnerable than wired networks because of their restricted physical security, power constraints, network topology which keeps altering dynamically, and due to improper centralized administr...
In ocean exploration and other maritime engineering, UAN (Underwater Acoustic Networks) is bound to play more important roles. Thinking of the serious environment UAN operates, safety and security must be guaranteed first. Among the possible attacks against UAN, DoS (Denial of Service) is a class of commonly-used methods. The basic procedures of different DoS attacks are analyzed and some of th...
DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...
This paper presents a simple and robust mechanism called SYN-dog to sniff SYN flooding sources. We install SYN-dog as a software agent at leaf routers that connect stub networks to the Internet. The statelessness and low computation overhead of SYN-dog make itself immune to any flooding attacks. The core mechanism of SYN-dog is based on the protocol behavior of TCP SYN—SYN/ACK pairs, and is an ...
Distributed denial of service (DDoS) attacks seriously threaten Internet services yet there is currently no defence against such attacks that provides both early detection, allowing time for counteraction, and an accurate response. Traditional detection methods rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. Current counteractions such as t...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be rendered inoperable by simple flooding attacks generated from insider nodes. In this paper, we study detection and containment mechanisms against insider Denial of Service (DoS) attacks for overlay networks. To counter such ...
This paper introduces FastPass, an architecture that thwarts flooding attacks by providing destinations with total control over their upstream network capacity. FastPass explores an extreme design point, providing complete resistance to directed flooding attacks. FastPass builds upon prior work on network capabilities and addresses the oft-noted problem that in such schemes, a sender must first...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید