نتایج جستجو برای: denial of service

تعداد نتایج: 21193855  

2013
Vijay D. Katkar Rohan P. Petare Yogesh P. Jagdale Raviraj B. Mohite

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack exhausts the resources of server/service and makes it unavailable for legitimate users. It can result in huge loss of money. With increasing use of online services and attacks on these services, the necessity of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also marked by organizations. Different te...

2010
Desmond Allan Schmidt Suriadi Suriadi Alan Tickle Andrew J. Clark George M. Mohay Ejaz Ahmed James Mackie

The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ‘Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the testbed is to study the effectiveness of different...

2014
Sonali Swetapadma Sahu Manjusha Pandey

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causin...

1998
Bo Chen Vallipuram Muthukkumarasamy

This paper investigates the vulnerabilities in the 802.11 Distributed Coordination Function (DCF) mechanisms. We have conducted a series of Denial of Service (DoS) attack experiments targeting at the 802.11 DCF and evaluated the effectiveness of such attacks on different configurations. The results show that any current or upcoming 802.11 standards would not provide adequate help to mitigate th...

2006
Stephan Bohacek

An optimal approach to mitigation of flooding denial of service attacks is presented. The objective is to minimize effect of the mitigation while protecting the server. The approach relies on routers filtering enough packets so that the server is not overwhelmed while ensuring that as little filtering is performed as possible. The optimal solution is to filter packets at routers through which t...

2013
Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht V. S. Subrahmanian Martial Hebert Katsushi Ikeuchi Bruno Siciliano Shui Yu

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...

2011
Angelos D. Keromytis

Network bandwidth denial of service (DoS) attacks seek to consume the available bandwidth or router resources at or near a target host or network, such that legitimate traffic cannot reach its destination. The primary means for achieving this goal by sending large traffic volumes (packet floods) that do not respect congestion control signals, such as that in the Transmission Control Protocol (T...

2015
Dr. Brilly Sangeetha

Mobile Ad Hoc Network (MANET) consists of several devices, nodes or terminals which are connected wirelessly and capable to communicate with each other nodes without any pre-existing infrastructure. MANET is considered as autonomous system were mobile hosts are connected using wireless links and free to be dynamic were configuration may change time to time. The nodes in the MANET have the liber...

2016
Udaya Kiran Tupakula Vijay Varadharajan

In this chapter we discuss Distributed Denial of Service (DDoS) attacks in networks such as the Internet, which have become significantly prevalent over the recent years. We explain how DDoS attacks are performed and consider the ideal solution characteristics for defending against the DDoS attacks in the Internet. Then we present different research directions and thoroughly analyse some of the...

2002
Nathalie Weiler

Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them are successful on themselves alone. In this paper, we present a system that helps in the defence in depth of a network from DDoS attacks. In addition to state-of-art active and passive security defences, we propose a h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید