Results 221 to 230 of about 83,968 (275)
Denial-of-Service Attacks [PDF]
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work. Bandwidth and CPU load are very important aspects on how the resources are delivered by the servers.
Alexandru Enaceanu
core +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Examples of a denial-of-service (DoS) attack include flooding an identified system with more traffic than it can handle, flooding a service with more events than it can handle, or crashing a TCP/IP stack by sending corrupt packets. In this chapter, you will learn how to recognize and examine symptoms of a DoS attack and become informed about how to ...
openaire +1 more source
Examples of a denial-of-service (DoS) attack include flooding an identified system with more traffic than it can handle, flooding a service with more events than it can handle, or crashing a TCP/IP stack by sending corrupt packets. In this chapter, you will learn how to recognize and examine symptoms of a DoS attack and become informed about how to ...
openaire +1 more source
Denial of service and distributed denial of service attacks
Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire +1 more source
Denial of service and distributed denial of service-today and tomorrow
2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005The most common method of attacks experienced today is by means of denial of service (DoS) and distributed denial of service (DDoS) attacks. This work gives a detailed overview of these attacks. It presents the current trends that a DDoS attack follows and the rate of infection today, compared to previous infections.
L. Meyer, W.T. Penzhorn
openaire +1 more source
International Journal of Information Security and Cybercrime, 2021
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
openaire +1 more source
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
openaire +1 more source
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering
openaire +1 more source
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering
openaire +1 more source
2005
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system memory as possible in order to make their opponents unable to run their applications. In those days it was not anticipated that the whole idea would reemerge some 35 years later to become one of the most ...
Lech J. Janczewski, Andrew M. Colarik
openaire +1 more source
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system memory as possible in order to make their opponents unable to run their applications. In those days it was not anticipated that the whole idea would reemerge some 35 years later to become one of the most ...
Lech J. Janczewski, Andrew M. Colarik
openaire +1 more source
Analysis of denial-of-service attacks on denial-of-service defensive measures
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
B.-T. Wang, H. Schulzrinne
openaire +1 more source
Denial of Service Prevention for 5G
Wireless Personal Communications, 20105G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced terminals.
Li, Yao, Kaur, Bipjeet, Andersen, Birger
openaire +1 more source
Denial of service attacks: An overview
2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014Denial of service (DoS) attacks present one of the most significant threats to assurance of ependable and secure information systems. Rapid development of new and increasingly sophisticated attacks requires resourcefulness in designing and implementing reliable defences.
Zlomislić, Vinko +2 more
openaire +2 more sources

