نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2008
Josep L. Berral Javier Alonso Nicolas Poggi Ricard Gavaldà Manish Parashar Jordi Torres

Adaptive techniques based on machine learning and data mining are gaining relevance in selfmanagement and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the tar...

2008
Dongwon Seo Heejo Lee Ejovi Nuwere

The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. However, SIP-based VoIP service basically has two main security issues, malformed SIP message attack and SIP flooding attack. In this paper, we propose a novel mechanism for SIP-based VoIP system utilizing rule matching...

2012
ARUNMOZHI ANNAMALAI VENKATARAMANI YEGNANARAYANAN

The risks to users of wireless technology have increased as the service has become more popular. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and to ad hoc routing attacks. There are a wide variety of routing attacks that target the weakness of MANETs. ...

Journal: :J. Inf. Sci. Eng. 2004
Chi-Shih Chao Yu-Xin Chen An-Chi Liu

Due to the high demand for network service availability and reliability, the IDS (Intrusion Detecting System) has become an essential element for IP networks. Currently, most IDSs use a pattern-matching mechanism to detect network flooding attacks. However, while running, such a mechanism needs to take into considerable the computing time/resource of an IDS or an IDS-embedded router. This can e...

2011
Ki Yeol Ryu Byeong-hee Roh

With the nature of SIP with a text-based message format and its openness to the public Internet, it is exposed to a number of potential threats of Denial of Service (DoS) by flooding attacks. In this paper, we propose a whitelist-based SIP flooding attack detection schemes.

2007
Yu Chen Kai Hwang Wei-Shinn Ku

It is highly desired to detect the DDoS flooding attacks at an early stage in order to launch effective countermeasures timely. We have developed a distributed change-point detection scheme to detect flooding type DDoS attacks over multiple network domains. The approach is to monitor the spatiotemporal pattern of the attack traffic. We have simulated the new defense system on the DETER testbed....

Journal: :J. Internet Serv. Inf. Secur. 2013
Junho Choi Chang Choi Byeongkyu Ko Dongjin Choi Pankoo Kim

A distributed denial of service attacks are the most serious factor among network security risks in cloud computing environment. This study proposes a method of integration between HTTP GET flooding among DDOS attacks and MapReduce processing for a fast attack detection in cloud computing environment. This method is possible to ensure the availability of the target system for accurate and relia...

2018
Lei Xue Xiaobo Ma Xiapu Luo Edmond W.W. Chan Tony T.N. Miu Guofei Gu

A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been proposed, the deployment issues limit their usage since they require either additional modules to enhance routers or using the software-defined ne...

2006
Dan Wendlandt David G. Andersen Adrian Perrig

We describe the design and implementation of FastPass, a next-generation network architecture that thwarts bandwidth flooding attacks by providing destinations with finegrained control over their upstream network capacity. Prior attempts to achieve network flood resilience have required destinations to successfully receive an initial unprotected packet (capability-based designs) or have relied ...

Journal: :International Journal of Grid and Distributed Computing 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید