Results 231 to 240 of about 185,090 (283)
Some of the next articles are maybe not open access.
Analysis of denial-of-service attacks on denial-of-service defensive measures
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004Currently, denial-of-service (DoS) attacks remain among the most critical threats on the Internet. Ironically, although a major objective of Internet protocol design was to prevent DoS attacks and to maintain network connections in order to provide essential services to the masses uninterruptedly, the Internet is suffering significantly from ...
Bao-Tung Wang, Henning Schulzrinne
openaire +1 more source
ISPs and Denial-of-Service Attacks
Information Systems Security, 2000Abstract A denial of service (DOS) attack is any malicious attempt to deprive legitimate customers of their ability to access services, such as a Web server. DOS attacks fall into two broad categories: • Server vulnerability DOS attacks — attacks that exploit known bugs in operating systems and servers.
openaire +1 more source
Vulnerability of insens to denial of service attacks
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a particular challenge. This paper proposes to use formal methods to investigate the security of the INSENS protocol, in respect of its capability to withstand several denial ...
Kashif Saghar +2 more
openaire +1 more source
Denial of service and distributed denial of service attacks
Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire +1 more source
Denial-of-service attacks and countermeasures on BitTorrent
Computer Networks, 2012BitTorrent has been widely used for the efficient distribution of files, such as digital content and media files, to very large numbers of users. However, previous work has exposed vulnerabilities in the protocol and demonstrated that they can be exploited to perform severe Denial-of-Service (DoS) attacks against BitTorrent networks.
Matheus Brenner Lehmann +3 more
openaire +1 more source
Denial-of-service attack-detection techniques
IEEE Internet Computing, 2006Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events.
Glenn Carl +3 more
openaire +1 more source
Detecting Denial of Service Attacks in the Cloud
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016In this paper, an approach to protecting virtual machines (VMs) against denial of service (DoS) attacks in a cloud environment is proposed. An open source cloud computing platform (Eucalyptus) has been deployed, and experimentation was carried out on this setup. We investigate attacks emanating from one or more virtual machines (VMs) to another VM in a
Raneel Kumar +2 more
openaire +1 more source
A framework for classifying denial of service attacks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, 2003Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or multi-source can help focus a response, but current packet-header-based approaches are susceptible to spoofing.
Alefiya Hussain +2 more
openaire +1 more source
Statistically countering denial of service attacks
IEEE International Conference on Communications, 2005. ICC 2005. 2005, 2005In denial-of-service (DoS) attacks, the attackers usually randomize their source addresses to hide their true identities. This trick renders the victims unable to block the malicious traffic directly, as it appears to come from everywhere. Blocking the observed source addresses indiscriminatingly amounts to shutting off the legitimate communications at
openaire +1 more source
Optimizing the Pulsing Denial-of-Service Attacks
2005 International Conference on Dependable Systems and Networks (DSN'05), 2005In this paper we consider how to optimize a new generation of pulsing denial-of-service (PDoS) attacks from the attackers' points of views. The PDoS attacks are 'smarter' than the traditional attacks in several aspects. The most obvious one is that they require fewer attack packets to cause a similar damage.
Xiapu Luo, Rocky K. C. Chang
openaire +1 more source

