Results 241 to 250 of about 185,090 (283)
Some of the next articles are maybe not open access.
A Survey on Denial of Service Attacks and Preclusions
Proceedings of the International Conference on Informatics and Analytics, 2016Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world.
Nagesh K. +3 more
openaire +1 more source
An examination of distributed denial of service attacks
2015 IEEE International Conference on Electro/Information Technology (EIT), 2015Denial of service (DoS) attacks have been around for a significant period of time and is exponentially growing in popularity. This paper discusses various DoS attacks and the evolution towards distributed denial of service (DDoS) attacks. An analysis of high profile attacks will be conducted to evaluate the methods used by the attackers.
Alex Bartholemy, Weifeng Chen
openaire +1 more source
A framework for countering denial of service attacks
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 2005Recent trend of the adversaries "if I can't have it, nobody can" has changed the emphasis of information assurance with respect to information availability. This paper presents a knowledge discovery framework to detect DoS attacks at the boundary controllers (routers).
Srinivas Mukkamala, Andrew H. Sung
openaire +1 more source
Surviving Distributed Denial-of-Service Attacks
IT Professional, 2009Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response
openaire +1 more source
A Framework for the Analysis of Denial of Service Attacks
The Computer Journal, 2004We develop a framework for the analysis of Denial of Service (DoS) attacks in computer networks. In this framework, we identify the components and resources that collectively and in time, construct a service that may become unavailable due to the unavailability of those resources as a result of a DoS.
Ahmad R. Sharafat, Mehran S. Fallah
openaire +1 more source
Denial of Service Attacks Mitigation in the Cloud
2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, 2015Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability.
Wael Alosaimi +2 more
openaire +1 more source
Detecting Denial of Service Attacks in Tor
2009Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided.
Norman Danner +2 more
openaire +1 more source
Mitigating denial of service attacks: A tutorial
Journal of Computer Security, 2005This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase.
openaire +1 more source
Honeypots for distributed denial-of-service attacks
Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made, but none are successful by themselves. In this paper, we present a system that helps to defend a network from DDoS attacks.
openaire +1 more source
Security Control of Multiagent Systems Under Denial-of-Service Attacks
IEEE Transactions on Cybernetics, 2022Yaqi Wang, Jianquan Lu, Jinling Liang
exaly

