نتایج جستجو برای: distributed denial of service attack

تعداد نتایج: 21214602  

2014
Sachin Garg

Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) a...

Journal: :Journal of Systems and Software 2013
Elena del Val Noguera Miguel Rebollo Vicent J. Botti

In distributed environments where entities only have a partial view of the system, cooperation plays a key issue. In the case of decentralized service discovery in open Service-Oriented Multi-Agent Systems, agents only know about the services they provide and their direct neighbors. Therefore, they need the cooperation of their neighbors in order to locate the required services. However, cooper...

2012
Bae-Ling Chen Wen-Chung Kuo Lih-Chyau Wuu

Sood, Sarje, and Singh recently proposed a secure dynamic identity-based (ID-based) authentication protocol for multi-server architectures utilizing smart cards, wherein they reveal security weaknesses of Hsiang and Shih’s dynamic identity-based remote user authentication scheme. Sood et al. claim their proposed scheme can provide protection from various attacks such as replay, malicious user, ...

Journal: :IEEE Internet Computing 2005
Steve Vinoski

Iwrote about notification-based Web service systems one year ago (“Web Services Notification,” Mar./Apr. 2004, pp. 86–90). To properly address the topic, I devoted a significant portion to Web service references, which are, conceptually, like network handles that refer to Web services. Service references are particularly important for notification systems, which usually require subscribers to r...

Journal: :International Journal of Computer Applications 2017

2013
B. B. Jayasingh B. Swathi

Ad Hoc networks are susceptible to many attacks due to its unique characteristics such as open network architecture, stringent resource constraints, shared wireless medium and highly dynamic topology. The attacks can be of different types out of which denial of service is one of the most difficult attacks to detect and defend. Jellyfish is a new denial of service attack that exploits the end to...

Journal: :Journal of Physics: Conference Series 2021

Journal: :JCP 2013
Bo Meng Wei Huang Zimao Li

The huge damage of denial of service attacks in security protocols attracts researchers’ attention and effort to analysis, verification and prevention of denial of service attacks. In order to model resistance of denial of service attacks, firstly, we extend applied pi calculus from both adversary context and processes aspects; secondly, the first computer-aided method of resistance of denial o...

Journal: :Fundam. Inform. 2004
Min-Shiang Hwang Jung-Wen Lo Chia-Hsin Liu

In this manuscript, two key agreement protocols which are resistant to a denial-of-service attack are constructed from a key agreement protocol in [9] provably secure against passive and active attacks. The denial-of-service attack considered is the resource-exhaustion attack on a responder. By the resource-exhaustion attack, a malicious initiator executes a key agreement protocol simultaneousl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید