نتایج جستجو برای: distributed denial of service attack

تعداد نتایج: 21214602  

Journal: :MATEC web of conferences 2022

Information technology is currently one of the things that almost all universities widely adopt. The development information requires to manage potential resources effectively and efficiently. as stated in regulation Minister Research, Technology, Higher Education Number 62 2017 concerning governance university environment support achievement increasing access, relevance, quality higher educati...

2015

Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. This information is required for that node is kept confidentially. Attacker in network computer captures this information that is confidential and misuse the network. Hence security is one of the major...

2011
Santosh Kumar Abhinav Bhandari

In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...

2011
Abhinav Bhandari Amrit Lal Sangal Krishan Kumar Saluja

Distributed Denial of Service (DDoS) attack is one of the biggest threats now days. This paper aims at providing the simulation results of buffer size and attack intensities effect on various queuing algorithms such as DropTail, Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random Early Detection (RED) using ns-2 as a simulation environment. The results in this...

2003
W. J. Blackert D. M. Gregg A. K. Castner R. L. Hom R. M. Jokerst E. M. Kyle

2013
Vijay D. Katkar Rohan P. Petare Yogesh P. Jagdale Raviraj B. Mohite

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack exhausts the resources of server/service and makes it unavailable for legitimate users. It can result in huge loss of money. With increasing use of online services and attacks on these services, the necessity of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also marked by organizations. Different te...

Journal: :JNW 2006
Valer Bocan Vladimir Cretu

Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...

2009
Josef Spillner Iris Braun Alexander Schill

Service-oriented computing is increasingly assuming an important role in the research on distributed systems and software engineering. It has also reached application and service hosters by now who need to be able to host off-the-shelf services as well as custom services. Thus, they are faced with a variety of service descriptions, service package formats and runtime demands. Each service techn...

2008
Zubair A. Baig

Wireless sensor networks have emerged as a significant source for the study and analysis of data from the environment. These networks are deployed in harsh and inaccessible environments with the purpose of monitoring their respective surroundings, and generating observed readings, for delivery to a centralised entity, for further data analysis. Sensor nodes are tiny devices with limited availab...

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید