نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2011
Steven Salerno Ameya Sanzgiri Shambhu J. Upadhyaya

Due to the ever increasing capabilities of current generation smartphones, they are quickly becoming more attractive targets for malicious attackers. The potential of porting attacks and malware from modern computers to these mobile devices is becoming a reality. In this paper, we explore the possibility of staging some attacks on the 802.11 network interface which is common to all smartphones....

2012
Yves Igor Jerschow

In this thesis, we tackle the problem of securing communication in Local Area Networks (LANs) and making it resistant against Denial-of-Service (DoS) attacks. The main vulnerability in wired and wireless LANs is the lack of initial address authenticity. It enables an attacker to take on different identities and to inject faked packets bearing a foreign or a bogus sender address. For this reason...

2012
Rakesh Kumar Sahu Narendra S. Chaudhari

This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and ...

Journal: :J. Network and Computer Applications 2013
Gimer Cervera Michel Barbeau Joaquín García Evangelos Kranakis

Multipath routing has been proposed to increase resilience against network failures or improve security in Mobile Ad-Hoc Networks (MANETs). The Optimized Link State Routing (OLSR) protocol has been adopted by several multipath routing strategies. They implement Multipoint Relay (MPRs) nodes as a flooding mechanism for distributing control information. Ideally, the construction of multiple disjo...

2001
Dong Xuan Shengquan Wang Ye Zhu Riccardo Bettati Wei Zhao

We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their i...

2008
Xin Liu Xiaowei Yang Yanbin Lu

This paper presents the design and implementation of a filter-based DoS defense system (StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the StopIt design is a novel closed-control, open-service architecture: any receiver can use StopIt to block the undesired traffic it receives, yet the design is robust to various strategic attacks from millions of bo...

2015
Devisha Srivastava

Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the Internet. Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. While many approaches exist to filter network-level attacks, the...

2003
Sanguk Noh Cheolho Lee Kyunghee Choi Gihyun Jung

As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none of these studies takes all the flags within TCP header into account, nor do th...

2012
Purushottam Patel Rupali Soni

Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases th...

2001
Zheng Zhang Jun Li C. N. Manikopoulos Jay Jorgenson

our data than the alternatives. We also stress-tested the entire system, which showed that HIDE can reliably detect UDP flooding attacks with attack intensity as low as five to ten percent of background traffic.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید