Results 221 to 230 of about 83,968 (275)

Denial-of-Service Attacks [PDF]

open access: yesJournal of Information Systems & Operations Management, 2007
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work. Bandwidth and CPU load are very important aspects on how the resources are delivered by the servers.
Alexandru Enaceanu
core   +4 more sources

Denial of Service

2021
Examples of a denial-of-service (DoS) attack include flooding an identified system with more traffic than it can handle, flooding a service with more events than it can handle, or crashing a TCP/IP stack by sending corrupt packets. In this chapter, you will learn how to recognize and examine symptoms of a DoS attack and become informed about how to ...
openaire   +1 more source

Denial of service and distributed denial of service attacks

Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003
The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire   +1 more source

Denial of service and distributed denial of service-today and tomorrow

2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005
The most common method of attacks experienced today is by means of denial of service (DoS) and distributed denial of service (DDoS) attacks. This work gives a detailed overview of these attacks. It presents the current trends that a DDoS attack follows and the rate of infection today, compared to previous infections.
L. Meyer, W.T. Penzhorn
openaire   +1 more source

Denial-of-Service Attack

International Journal of Information Security and Cybercrime, 2021
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
openaire   +1 more source

Denial of service

Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering
openaire   +1 more source

Denial of Service Threat

2005
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system memory as possible in order to make their opponents unable to run their applications. In those days it was not anticipated that the whole idea would reemerge some 35 years later to become one of the most ...
Lech J. Janczewski, Andrew M. Colarik
openaire   +1 more source

Analysis of denial-of-service attacks on denial-of-service defensive measures

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004
Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
B.-T. Wang, H. Schulzrinne
openaire   +1 more source

Denial of Service Prevention for 5G

Wireless Personal Communications, 2010
5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced terminals.
Li, Yao, Kaur, Bipjeet, Andersen, Birger
openaire   +1 more source

Denial of service attacks: An overview

2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014
Denial of service (DoS) attacks present one of the most significant threats to assurance of ependable and secure information systems. Rapid development of new and increasingly sophisticated attacks requires resourcefulness in designing and implementing reliable defences.
Zlomislić, Vinko   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy