نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

Journal: :Computer Communications 2008
Sven Ehlert Ge Zhang Dimitris Geneiatakis Georgios Kambourakis Tasos Dagiuklas Jirí Markl Dorgham Sisalem

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.03.016 * Corresponding author. Tel.: +49 30 3463 7378; fa E-mail addresses: [email protected] fraunhofer.de (G. Zhang), [email protected] (D. Gen (G. Kambourakis), [email protected] (T. Dagiuklas), jiri. [email protected] (D. Sisalem). The emergence of Voice over IP (VoIP) has offered numerous advantag...

2012
A. M. Lonea D. E. Popescu H. Tianfield Alina Madalina Lonea Daniela Elena Popescu Huaglory Tianfield

This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud services disruptions. Our solution is to combine the evidences obtained from Intrusion Detection Systems (IDSs) deployed in the virtual machines (VMs) of the cloud systems with a data fusion methodology in the front-...

2012
Rishabh Jain Charul Dewan

A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ca...

2001
Ratul Mahajan Steven M. Bellovin Sally Floyd John Ioannidis Vern Paxson Scott Shenker

The current Internet infrastructure has very few built-in protection mechanisms and is therefore vulnerable to attacks and failures. In particular, recent events have illustrated the Internet’s vulnerability to both denial of service (DoS) attacks and flash crowds in which one or more links in the network (or servers at the edge of the network) become severely congested. In both flash crowds an...

2011
Rupinder Cheema Divya Bansal Sanjeev Sofat

Wireless mesh network is the key technology for present generation in wireless networking for providing fast and hassle free services to users. The conformity of Wireless Mesh Networks to offer Internet connectivity is becoming a popular choice for Wireless Internet Service Providers, as it allows a flexible, easy and inexpensive network deployment. However, these networks are prone to critical...

2005
Adam Greenhalgh Mark Handley Felipe Huici

Thorough defense against DoS attacks is extremely difficult without incurring significant changes to the Internet architecture. We present a series of changes aimed at establishing protection boundaries to reduce the effectiveness of most flooding DoS attacks against servers. Only minimal and local changes are required to current network architectures. We show that our scheme is highly benefici...

2014
Kuldeep Singh Sudesh Rani Satyanarayana Vuppala

Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of movable and independent nodes which operate without the support of any permanent infrastructure, hence MANET has dynamic topology. In MANET, each node forwards traffic unrelated to its own use. Despite the proliferation of MANET, it is prone to various attacks which include blackhole attack, grayhole attack, flooding attack...

Journal: :International Journal of Network Security & Its Applications 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید