نتایج جستجو برای: حملات syn flooding
تعداد نتایج: 21687 فیلتر نتایج به سال:
DeciDe, born as a project funded by ESA/ESRIN, is now a system for flood forecasting at the city of Florence based on the integration of heterogeneous data sources. For DeciDe a specific technique has been developed to use couples of ERS-2 PRI images from the same frame and track for comparison with corresponding moisture maps computed from rainfall fields. Couples of data sets are used to negl...
This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and ...
This paper presents our on-going project on performance evaluation of the major existing solutions based on serverside access control for SYN-flooding distributed denialof-service attacks using a real network system. Although many solutions have been proposed and implemented, there is no formal performance study that measures and compares the solutions based on server-side access control. The s...
-Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding, ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new ...
The Stream Control Transmission Protocol (SCTP) is a message oriented reliable transport layer protocol which uses four way handshake mechanism. It is more robust than TCP, which provides delivery of data between two end points, and message boundaries preservation as in UDP. Additionally it has advantage such as multihoming and multi streaming. These features increase the availability of data c...
چکیده ندارد.
Fuzzy logic is one of the powerful tools for reasoning under uncertainty and since uncertainty is an intrinsic characteristic of intrusion analysis, Fuzzy logic is therefore an appropriate tool to use to analyze intrusions in a Network. This paper presents a fuzzy logic based network intrusion detection system to predict neptune which is a type of a Transmission Control Protocol Synchronized (T...
the present study was conducted to investigate the effect of implicit focus on form through input flooding and the effect of noticing, explicit focus on form on linguistic accuracy. to fulfill the purpose of the study, 86 iranian pre-intermediate efl learners of one of the language institutes were chosen by means of administering ket as the homogeneity test. these learners were pretested throug...
In the paper we introduce a hybrid system for simulating DDoS attacks and computer network protection techniques. The developed system makes it possible to create various network topologies, perform experiments with DDoS attack simulation, develop new protection methods and test the existing ones. The suggested system not only allows us to design virtual networks, but also makes it possible to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید