نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2005
Kai Hwang Yu-Kwong Kwok Shanshan Song Min Cai Yu Chen Ying Chen Runfang Zhou Xiaosong Lou

The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure wide-area networked resource sites participating in a Grid application. We report new developments in trust modeling, security-binding methodology, and defense architecture against intrusions, worms, and flooding attacks. We propose a novel architectural design of Grid security infrastru...

Journal: :IEEE Transactions on Network Science and Engineering 2021

With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming extremely challenging to design a fully protected network. For instance, Stealthy Link Flooding Attack (SLFA) variant DDoS attacks that strives block access target area by flooding small set links, and shown can bypass traditional defense mechanisms. One potential solution tackle such SLFAs apply Movin...

2011
A. Amuthan

A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with distributed architecture. MANETs has no basic infrastructure also has no fixed access point or routers, where in the nodes moves in an undefined manner in a specified area of work. Basically, the distributed dynamic architecture is vulnerable to various kinds of attacks like blackhole, wormhole flooding, etc. Providing a security ...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Xiapu Luo Edmond W. W. Chan Rocky K. C. Chang

This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It al...

2011
Kazi Zunnurhain Susan V. Vrbsky

Cloud computing has been envisioned as the next generation architecture of IT Enterprises. It offers great potential to improve productivity and reduce costs. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to large data centers, where the management of the data an...

2009
Sven Ehlert

The Session Initiation Protocol (SIP) is the multimedia communication protocol of the future. Used for Voice-over-IP (VoIP), Internet Multimedia Subsystem (IMS) and Internet Protocol Television (IPTV), its concepts are based on mature and open standards and its use is increasing rapidly within recent years. However, with its acceptance as a mainstream communication platform, security concerns b...

2012
Nauris Paulins

IP Multimedia Subsystem (IMS) is defined by 3GPP/3GPP2 and has become as a major part of the next-generation networks (NGN) service delivery platform. IMS provides convergence of two most successful communication paradigms – data networks (the Internet) and cellular networks on IP based infrastructure. Such platform allows an easy development of new value added and multimedia services. Open arc...

2000
Urupoj Kanlayasiri Surasak Sanguanpong

This paper presents a method for detecting TCP SYN flooding attack using BENEF model. Our model relies on the significant parameters of anomalous network packets, the statistic of system behavior, and the decision with threshold and fuzzy rule-based technique. With fuzzy technique, rules or a set of rules corresponding with the appropriate membership value are designed for analysis and to find ...

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

2008
Meiko Jensen Nils Gruschka

The service-oriented architecture paradigm slowly matures towards some kind of “Web Service Internet” where basically everybody may use the services others provide. Though this evolution enables lots of opportunities for electronic business, it also induces many new security issues to consider. One important security threat to SOA consists in request floodings, which—being intentional or accide...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید