Results 11 to 20 of about 503,301 (280)
Measuring denial Of service [PDF]
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users, by introducing large delays, excessive losses, and service interruptions. The main goal of DoS defenses is to neutralize this effect, and to quickly and fully restore quality of various services to levels acceptable by the users.
Jelena Mirkovic +6 more
openaire +1 more source
Software defined networks are an emerging category of networks in which the data plane and control plane are separated. This separation of planes opens the door for designing sophisticated routing algorithms that would overwhelm the computing power of ...
Nada M. AbdelAzim +3 more
doaj +1 more source
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam +1 more
doaj +1 more source
Denial-of-Service Resistance in Key Establishment [PDF]
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin +4 more
core +2 more sources
Preventing flow table overflow against denial of service attack in software defined network
Aiming at denial of service attacks would cause overflow of the limited flow table space of the switch in software defined network, failure to install flow table rules for normal network packets, packet forwarding delay, and packet loss, FloodMitigation ...
Dongbin WANG +7 more
doaj +2 more sources
The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability.
T. Yerriswamy, Murtugudde Gururaj
doaj +1 more source
Mitigation of Distributed Denial of Service Attacks in the Cloud
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael +4 more
doaj +1 more source
The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these networks.
Basim Ahmad Alabsi +2 more
doaj +1 more source
Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core +1 more source
Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World [PDF]
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers.
Rajeev Singh, T. P. Sharma
doaj +1 more source

