نتایج جستجو برای: distributed denial of service attack
تعداد نتایج: 21214602 فیلتر نتایج به سال:
Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) a...
In distributed environments where entities only have a partial view of the system, cooperation plays a key issue. In the case of decentralized service discovery in open Service-Oriented Multi-Agent Systems, agents only know about the services they provide and their direct neighbors. Therefore, they need the cooperation of their neighbors in order to locate the required services. However, cooper...
Sood, Sarje, and Singh recently proposed a secure dynamic identity-based (ID-based) authentication protocol for multi-server architectures utilizing smart cards, wherein they reveal security weaknesses of Hsiang and Shih’s dynamic identity-based remote user authentication scheme. Sood et al. claim their proposed scheme can provide protection from various attacks such as replay, malicious user, ...
Iwrote about notification-based Web service systems one year ago (“Web Services Notification,” Mar./Apr. 2004, pp. 86–90). To properly address the topic, I devoted a significant portion to Web service references, which are, conceptually, like network handles that refer to Web services. Service references are particularly important for notification systems, which usually require subscribers to r...
Ad Hoc networks are susceptible to many attacks due to its unique characteristics such as open network architecture, stringent resource constraints, shared wireless medium and highly dynamic topology. The attacks can be of different types out of which denial of service is one of the most difficult attacks to detect and defend. Jellyfish is a new denial of service attack that exploits the end to...
The huge damage of denial of service attacks in security protocols attracts researchers’ attention and effort to analysis, verification and prevention of denial of service attacks. In order to model resistance of denial of service attacks, firstly, we extend applied pi calculus from both adversary context and processes aspects; secondly, the first computer-aided method of resistance of denial o...
In this manuscript, two key agreement protocols which are resistant to a denial-of-service attack are constructed from a key agreement protocol in [9] provably secure against passive and active attacks. The denial-of-service attack considered is the resource-exhaustion attack on a responder. By the resource-exhaustion attack, a malicious initiator executes a key agreement protocol simultaneousl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید