نتایج جستجو برای: denial of service

تعداد نتایج: 21193855  

2000
Felix Lau Stuart Harvey Rubin Michael H. Smith Ljiljana Trajkovic

We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to: “flood” a network and thus reduce a legitimate ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - پژوهشکده زبانشناسی 1389

a professional is someone whose work involves performing a certain function with some degree of expertise. but a narrower definition limits the term to apply to people such as teachers and doctors, whose expertise involves not only skill and knowledge but also the exercise of highly sophisticated judgment, and whose accreditation necessitates extensive study, often university-based as well as p...

Journal: :RFC 2006
Mark Handley Eric Rescorla Internet Architecture Board

Internet Denial-of-Service Considerations Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document provides an overview of possible avenues for denial-of-service (DoS) attack on Internet systems. The aim is to encourage protocol designers and network enginee...

Journal: :CoRR 2015
Hrishikesh Deshpande

Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...

2003
Evgeniy Gabrilovich Alex Gontmakher

Providing live support over the Net is much cheaper than the 1-800 option since an operator can handle several chat sessions simultaneously. The downside of this approach, however, is that “the human in the loop” can now be a target of a new class of network attacks. Take a simple chat-bot program that connects to an online chat service. Smart it is not – an operator can tell it from a human af...

Journal: :Current Trends in Computer Sciences & Applications 2019

Journal: :DEStech Transactions on Engineering and Technology Research 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید