نتایج جستجو برای: flooding attacks
تعداد نتایج: 70542 فیلتر نتایج به سال:
The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure wide-area networked resource sites participating in a Grid application. We report new developments in trust modeling, security-binding methodology, and defense architecture against intrusions, worms, and flooding attacks. We propose a novel architectural design of Grid security infrastru...
With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) variant DDoS attacks that strives block access target area by flooding small set links, and shown can bypass traditional defense mechanisms. One potential solution tackle such SLFAs apply Movin...
A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with distributed architecture. MANETs has no basic infrastructure also has no fixed access point or routers, where in the nodes moves in an undefined manner in a specified area of work. Basically, the distributed dynamic architecture is vulnerable to various kinds of attacks like blackhole, wormhole flooding, etc. Providing a security ...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It al...
Cloud computing has been envisioned as the next generation architecture of IT Enterprises. It offers great potential to improve productivity and reduce costs. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to large data centers, where the management of the data an...
The Session Initiation Protocol (SIP) is the multimedia communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), its concepts are based on mature and open standards and its use is increasing rapidly within recent years. However, with its acceptance as a mainstream communication platform, security concerns b...
IP Multimedia Subsystem (IMS) is defined by 3GPP/3GPP2 and has become as a major part of the next-generation networks (NGN) service delivery platform. IMS provides convergence of two most successful communication paradigms – data networks (the Internet) and cellular networks on IP based infrastructure. Such platform allows an easy development of new value added and multimedia services. Open arc...
This paper presents a method for detecting TCP SYN flooding attack using BENEF model. Our model relies on the significant parameters of anomalous network packets, the statistic of system behavior, and the decision with threshold and fuzzy rule-based technique. With fuzzy technique, rules or a set of rules corresponding with the appropriate membership value are designed for analysis and to find ...
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
The service-oriented architecture paradigm slowly matures towards some kind of “Web Service Internet” where basically everybody may use the services others provide. Though this evolution enables lots of opportunities for electronic business, it also induces many new security issues to consider. One important security threat to SOA consists in request floodings, which—being intentional or accide...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید