نتایج جستجو برای: distributed denial of service attack
تعداد نتایج: 21214602 فیلتر نتایج به سال:
Information technology is currently one of the things that almost all universities widely adopt. The development information requires to manage potential resources effectively and efficiently. as stated in regulation Minister Research, Technology, Higher Education Number 62 2017 concerning governance university environment support achievement increasing access, relevance, quality higher educati...
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. This information is required for that node is kept confidentially. Attacker in network computer captures this information that is confidential and misuse the network. Hence security is one of the major...
In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...
Distributed Denial of Service (DDoS) attack is one of the biggest threats now days. This paper aims at providing the simulation results of buffer size and attack intensities effect on various queuing algorithms such as DropTail, Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random Early Detection (RED) using ns-2 as a simulation environment. The results in this...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack exhausts the resources of server/service and makes it unavailable for legitimate users. It can result in huge loss of money. With increasing use of online services and attacks on these services, the necessity of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also marked by organizations. Different te...
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...
Service-oriented computing is increasingly assuming an important role in the research on distributed systems and software engineering. It has also reached application and service hosters by now who need to be able to host off-the-shelf services as well as custom services. Thus, they are faced with a variety of service descriptions, service package formats and runtime demands. Each service techn...
Wireless sensor networks have emerged as a significant source for the study and analysis of data from the environment. These networks are deployed in harsh and inaccessible environments with the purpose of monitoring their respective surroundings, and generating observed readings, for delivery to a centralised entity, for further data analysis. Sensor nodes are tiny devices with limited availab...
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید