نتایج جستجو برای: denial of service

تعداد نتایج: 21193855  

Mahdi Omrani, Masoud Shafiee, Siavash Khorsandi,

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

2001
David Karig

As evinced by a series of high profile attacks, denial of service (DoS), or prevention of legitimate access to resources, is a threat that demands attention. Of particular concern are distributed attacks, in which an adversary recruits several computers to aid in the attack. The first major distributed denial of service (DDoS) attack brought down the University of Minnesota’s network for three ...

2013
Abusayeed Saifullah

A high profile internet server is always a target of denial-of-service attacks. In this project, we propose a novel technique for protecting an internet server from distributed denial-of-service attacks. The defense mechanism is based on a distributed algorithm that performs weight-fair throttling at the upstream routers. The throttling is weight-fair because the traffics destined for the serve...

2012
A. Prathap R. Sailaja

In the networking systems the flow of information is the most important service. It is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threats like Denial-of-Service (DoS), we need to build an early detection system that can detect the presence of a worm in the Internet as quickly as possible in ...

2004
Kendall E. Giles David J. Marchette Carey E. Priebe

In this paper we explore the use of spectral analysis techniques applied to artifacts of denial of service attacks called backscatter packets. First, we detail how to partition backscatter data collected by a network sensor into logical attacks. Since backscatter packets are the result of spoofed packets sent to the target by the attacker, determining attack boundaries is an important first ste...

Journal: :JNW 2006
Valer Bocan Vladimir Cretu

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...

Journal: :International Journal of Computer Applications 2014

Journal: :ACM SIGCOMM Computer Communication Review 2012

Journal: :IEEE Transactions on Dependable and Secure Computing 2007

Journal: :International Journal of Advanced Computer Science and Applications 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید