نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

Journal: :JNW 2015
Muhammad Morshed Alam Muhammad Yeasir Arafat Feroz Ahmed

Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...

Journal: :International Journal of Computer Networks and Communications Security 2020

Journal: :Security and privacy 2021

The Internet of Things (IoT) ecosystem allows communication between billions devices worldwide that are collecting data autonomously. vast amount generated by these must be controlled totally securely. centralized solutions not capable responding to concerns due security challenges problems. Thus, the Average Packet Transmission RREQ (APT-RREQ) as an effective solution, has been employed overco...

Journal: :Jusikom : Jurnal Sistem Informasi Ilmu Komputer 2023

ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it difficult identify source attack. Network forensics in form dead and live using NIST method with stages collection, examination, Analysis, reportin...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده علوم انسانی 1391

the present study was conducted to investigate the effect of implicit focus on form through input flooding and the effect of noticing, explicit focus on form on linguistic accuracy. to fulfill the purpose of the study, 86 iranian pre-intermediate efl learners of one of the language institutes were chosen by means of administering ket as the homogeneity test. these learners were pretested throug...

Journal: :International Journal of Advances in Intelligent Informatics 2018

Journal: :CoRR 2005
Gianni Tedesco Uwe Aickelin

­ Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, is difficult to analyze. Intrusion alert correlation is the task of automating some of this analysis by grouping related alerts together. Attack graphs provide an intuitive model for such analys...

2002
Ratul Mahajan Steven M. Bellovin Sally Floyd John Ioannidis Vern Paxson Scott Shenker

Recent events have illustrated the Internet’s vulnerability to both denial of service (DoS) attacks and flash crowds in which links (or servers) in the network become severely congested. In both DoS attacks and flash crowds, the congestion is neither due to a single flow, nor due to a general increase in traffic, but to a well-defined subset of the traffic — an aggregate. This paper proposes ag...

2016
Anil Saini

MANETs are fast emerging as alternate network architecture to infrastructure networks. It is finding many applications and the constraints of processing power, memory, and bandwidth will be soon being overcome with the rapid improvement in the technologies. However the major concern which will remain is the security of the network. MANETs differ largely in the routing mechanism in the network l...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید