Results 231 to 240 of about 503,301 (280)
Some of the next articles are maybe not open access.
Denial of Service Prevention for 5G
Wireless Personal Communications, 20105G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced terminals.
Yao Li, Bipjeet Kaur, Birger Andersen
openaire +1 more source
Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, 1993
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering
openaire +1 more source
The contractor uses the client, the network, and the server to give a service to the customer. We put it this way to emphasise that the denial of service against which we seek to protect is the denial of service to the customer, not to the client. The attack may indeed consist of disabling or destroying the client, just as it may consist of interfering
openaire +1 more source
IEEE Security & Privacy, 2005
By understanding the types of attacks available to an adversary, we can develop more effective defenses against them. A taxonomy of denial-of-service attacks based on a dance-hall metaphor is a step toward gaining such an understanding. This article presents a metaphor for DoS-the dance hall-that helps us toward a comprehensive view of DoS attacks.
openaire +1 more source
By understanding the types of attacks available to an adversary, we can develop more effective defenses against them. A taxonomy of denial-of-service attacks based on a dance-hall metaphor is a step toward gaining such an understanding. This article presents a metaphor for DoS-the dance hall-that helps us toward a comprehensive view of DoS attacks.
openaire +1 more source
Denial of service and distributed denial of service attacks
Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire +1 more source
Denial of service and distributed denial of service-today and tomorrow
2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005The most common method of attacks experienced today is by means of denial of service (DoS) and distributed denial of service (DDoS) attacks. This work gives a detailed overview of these attacks. It presents the current trends that a DDoS attack follows and the rate of infection today, compared to previous infections.
L. Meyer, W.T. Penzhorn
openaire +1 more source
2021
Examples of a denial-of-service (DoS) attack include flooding an identified system with more traffic than it can handle, flooding a service with more events than it can handle, or crashing a TCP/IP stack by sending corrupt packets. In this chapter, you will learn how to recognize and examine symptoms of a DoS attack and become informed about how to ...
openaire +1 more source
Examples of a denial-of-service (DoS) attack include flooding an identified system with more traffic than it can handle, flooding a service with more events than it can handle, or crashing a TCP/IP stack by sending corrupt packets. In this chapter, you will learn how to recognize and examine symptoms of a DoS attack and become informed about how to ...
openaire +1 more source
Denial of service in sensor networks
Computer, 2002Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments, helping to protect and monitor military, environmental, safety-critical, or domestic infrastructures and resources, Denial-of-service attacks against such networks, however, may permit real world damage to public health and safety.
Anthony D. Wood, John A. Stankovic
openaire +1 more source
Denial-of-Service Mitigation for Internet Services
2014Denial-of-service attacks present a serious threat to the availability of online services. Distributed attackers, i.e. botnets, are capable of exhausting the server capacity with legitimate-looking requests. Such attacks are difficult to defend against using traditional filtering mechanisms. We propose a machine learning and filtering system that forms
Aapo Kalliola +2 more
openaire +1 more source
ISPs and Denial-of-Service Attacks
Information Systems Security, 2000Abstract A denial of service (DOS) attack is any malicious attempt to deprive legitimate customers of their ability to access services, such as a Web server. DOS attacks fall into two broad categories: • Server vulnerability DOS attacks — attacks that exploit known bugs in operating systems and servers.
openaire +1 more source
Denial of service attacks: An overview
2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014Denial of service (DoS) attacks present one of the most significant threats to assurance of ependable and secure information systems. Rapid development of new and increasingly sophisticated attacks requires resourcefulness in designing and implementing reliable defences.
Zlomislić, Vinko +2 more
openaire +2 more sources

