نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2015
Christos Pappas Raphael M. Reischuk Adrian Perrig

Forwarding accountability mechanisms pinpoint the sending/forwarding properties of traffic to the entities that send and forward the traffic along a path. In this paper, we take flooding attacks as a use case and describe a proposal to hold senders accountable for the sending rates of their flows. Furthermore, we describe the corresponding challenges, potential solutions, and briefly present th...

Journal: :Applied sciences 2022

Internet Protocol version six (IPv6) is more secure than its forerunner, four (IPv4). IPv6 introduces several new protocols, such as the Control Message (ICMPv6), an essential protocol to networks. However, it exposes networks some security threats since ICMPv6 messages are not verified or authenticated, and they mandatory that cannot be blocked disabled. One of currently facing exploitation by...

2005
Yu-Kwong Kwok Rohit Tripathi Yu Chen Kai Hwang

High availability in network services is crucial for effective largescale distributed computing. While distributed denial-of-service (DDoS) attacks through massive packet flooding have baffled researchers for years, a new type of even more detrimental attack—shrew attacks (periodic intensive packet bursts with low average rate)—has recently been identified. Shrew attacks can significantly degra...

2003
Sapon Tanachaiwiwat Kai Hwang

We present a new packet filtering scheme, which is traffic-smart to defend against network worms and flood attacks. The scheme prevents malicious hackers from orchestrating DDoS flooding attacks on any IP-based public network. All packets from each IP source are counted and timed during their life cycles. Special IP counters and timers are used to support the filtering process. This new approac...

Journal: :Computer Communications 2008
Jaehak Yu Hansung Lee Myung-Sup Kim Daihee Park

Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden...

2014
Jae-Hyun Jun Cheol-Woong Ahn Dongjoon Lee Sung-Ho Kim

While the increasing number of services available through computer networks is a source of great convenience for users, it raises several concerns, including the threat of hacking and the invasion of user privacy. Hackers can easily block network services by flooding traffic to servers or by breaking through network security, hence causing significant economic loss. It is well know that a Distr...

Journal: :CoRR 2012
Mehdi Ebady Manna Angela Amphawan

Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to network as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable re...

2003
Kai Hwang Pinalkumar Dave Sapon Tanachaiwiwat

This article presents a new defense system to protect network servers, network routers, and client hosts from becoming the handlers, Zombies, and victims of distributed denial-of-service (DDoS) flood attacks. The NetShield system was developed at USC to protect any IP-based public network over the Internet. We explore preventive and deterrent controls to remove system vulnerabilities on target ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید