Results 231 to 240 of about 185,090 (283)
Some of the next articles are maybe not open access.

Analysis of denial-of-service attacks on denial-of-service defensive measures

GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004
Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
Bao-Tung Wang, Henning Schulzrinne
openaire   +1 more source

ISPs and Denial-of-Service Attacks

Information Systems Security, 2000
Abstract A denial of service (DOS) attack is any malicious attempt to deprive legitimate customers of their ability to access services, such as a Web server. DOS attacks fall into two broad categories: • Server vulnerability DOS attacks — attacks that exploit known bugs in operating systems and servers.
openaire   +1 more source

Vulnerability of insens to denial of service attacks

2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a particular challenge. This paper proposes to use formal methods to investigate the security of the INSENS protocol, in respect of its capability to withstand several denial ...
Kashif Saghar   +2 more
openaire   +1 more source

Denial of service and distributed denial of service attacks

Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003
The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire   +1 more source

Denial-of-service attacks and countermeasures on BitTorrent

Computer Networks, 2012
BitTorrent has been widely used for the efficient distribution of files, such as digital content and media files, to very large numbers of users. However, previous work has exposed vulnerabilities in the protocol and demonstrated that they can be exploited to perform severe Denial-of-Service (DoS) attacks against BitTorrent networks.
Matheus Brenner Lehmann   +3 more
openaire   +1 more source

Denial-of-service attack-detection techniques

IEEE Internet Computing, 2006
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events.
Glenn Carl   +3 more
openaire   +1 more source

Detecting Denial of Service Attacks in the Cloud

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016
In this paper, an approach to protecting virtual machines (VMs) against denial of service (DoS) attacks in a cloud environment is proposed. An open source cloud computing platform (Eucalyptus) has been deployed, and experimentation was carried out on this setup. We investigate attacks emanating from one or more virtual machines (VMs) to another VM in a
Raneel Kumar   +2 more
openaire   +1 more source

A framework for classifying denial of service attacks

Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or multi-source can help focus a response, but current packet-header-based approaches are susceptible to spoofing.
Alefiya Hussain   +2 more
openaire   +1 more source

Statistically countering denial of service attacks

IEEE International Conference on Communications, 2005. ICC 2005. 2005, 2005
In denial-of-service (DoS) attacks, the attackers usually randomize their source addresses to hide their true identities. This trick renders the victims unable to block the malicious traffic directly, as it appears to come from everywhere. Blocking the observed source addresses indiscriminatingly amounts to shutting off the legitimate communications at
openaire   +1 more source

Optimizing the Pulsing Denial-of-Service Attacks

2005 International Conference on Dependable Systems and Networks (DSN'05), 2005
In this paper we consider how to optimize a new generation of pulsing denial-of-service (PDoS) attacks from the attackers' points of views. The PDoS attacks are 'smarter' than the traditional attacks in several aspects. The most obvious one is that they require fewer attack packets to cause a similar damage.
Xiapu Luo, Rocky K. C. Chang
openaire   +1 more source

Home - About - Disclaimer - Privacy