نتایج جستجو برای: حملات syn flooding

تعداد نتایج: 21687  

2000
Alberto Ortolani Francesco Meneguzzo Lorenzo Bottai Gaetano Zipoli

DeciDe, born as a project funded by ESA/ESRIN, is now a system for flood forecasting at the city of Florence based on the integration of heterogeneous data sources. For DeciDe a specific technique has been developed to use couples of ERS-2 PRI images from the same frame and track for comparison with corresponding moisture maps computed from rainfall fields. Couples of data sets are used to negl...

2012
Rakesh Kumar Sahu Narendra S. Chaudhari

This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and ...

2006
Hiroshi Fujinoki Ravi Kumar Boyapati

This paper presents our on-going project on performance evaluation of the major existing solutions based on serverside access control for SYN-flooding distributed denialof-service attacks using a real network system. Although many solutions have been proposed and implemented, there is no formal performance study that measures and compares the solutions based on server-side access control. The s...

Journal: :CoRR 2014
Prajwal R. Thakare K. Hanumantha Rao

-Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding, ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new ...

2015
SUSHMA PATIL

The Stream Control Transmission Protocol (SCTP) is a message oriented reliable transport layer protocol which uses four way handshake mechanism. It is more robust than TCP, which provides delivery of data between two end points, and message boundaries preservation as in UDP. Additionally it has advantage such as multihoming and multi streaming. These features increase the availability of data c...

2017
Nenekazi Nokuthala Penelope Mkuzangwe Fulufhelo Vincent Nelwamondo

Fuzzy logic is one of the powerful tools for reasoning under uncertainty and since uncertainty is an intrinsic characteristic of intrusion analysis, Fuzzy logic is therefore an appropriate tool to use to analyze intrusions in a Network. This paper presents a fuzzy logic based network intrusion detection system to predict neptune which is a type of a Transmission Control Protocol Synchronized (T...

Journal: :International Journal of Information and Network Security (IJINS) 2012

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده علوم انسانی 1391

the present study was conducted to investigate the effect of implicit focus on form through input flooding and the effect of noticing, explicit focus on form on linguistic accuracy. to fulfill the purpose of the study, 86 iranian pre-intermediate efl learners of one of the language institutes were chosen by means of administering ket as the homogeneity test. these learners were pretested throug...

2015
Konstantin Borisenko Ivan Kholod Andrey Shorov

In the paper we introduce a hybrid system for simulating DDoS attacks and computer network protection techniques. The developed system makes it possible to create various network topologies, perform experiments with DDoS attack simulation, develop new protection methods and test the existing ones. The suggested system not only allows us to design virtual networks, but also makes it possible to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید