نتایج جستجو برای: denial of service

تعداد نتایج: 21193855  

Journal: :CoRR 2012
B. B. Gupta Ramesh Chandra Joshi Manoj Misra

— The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the others. In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from p...

Journal: :Journal of Computer Security 2005
Jarmo Mölsä

This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase. A DoS program must first be deployed on one or more compromised hosts before an attack is possible. Mitigation...

2000
Xianjun Geng Andrew B. Whinston

T he notorious, crippling attack on e-commerce’s top companies in February 2000 and the recurring evidence of active network scanning—a sign of attackers looking for network weaknesses all over the Internet—are harbingers of future Distributed Denial of Service (DDoS) attacks. They signify the continued dissemination of the evil daemon programs that are likely to lead to repeated DDoS attacks i...

2005

With the continued growth of electronic commerce, voting, emergency, governmental and other informational systems the threat of massive network disruptions has never been more real. Hence, the development of denial of service countermeasures must be expanded. Recent work has shown that modifying known methods for verification (i.e. cryptographic protocol verification) prove useful in developing...

2002
Adam Back

Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as email, and anonymous remailers in May 1997. Five years on, this paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash. The hashcash CPU cost-function comp...

Journal: :CoRR 2017
Mohammad Shahrad Arsalan Mosenia Liwei Song Mung Chiang David Wentzlaff Prateek Mittal

Among storage components, hard disk drives (HDDs) have become the most commonly-used type of nonvolatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television (CCTV) systems, me...

Journal: :IJWMC 2007
Jason Smith Suratose Tritilanunt Colin Boyd Juan Manuel González Nieto Ernest Foo

Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be...

VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...

1995
Daniel C. Lee Myong H. Kang Ira S. Moskowitz

A designer of reliable MLS networks must consider covert channels and denial of service attacks in addition to traditional network performance measures such as throughput, fairness, and reliability. In this paper we show how to extend the NRL data Pump to a certain MLS network architecture in order to balance the requirements of congestion control, fairness, good performance, and reliability ag...

1997
Jussipekka Leiwo Yuliang Zheng

Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent nor mal operation of the system A method will be presented to specify and enforce a resource allocation policy to prevent denial of service attacks Resource allocation policy can be formally derived from a waiting time policy where maximum acceptable response times for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید