Results 241 to 250 of about 185,090 (283)
Some of the next articles are maybe not open access.

A Survey on Denial of Service Attacks and Preclusions

Proceedings of the International Conference on Informatics and Analytics, 2016
Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world.
Nagesh K.   +3 more
openaire   +1 more source

An examination of distributed denial of service attacks

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
Denial of service (DoS) attacks have been around for a significant period of time and is exponentially growing in popularity. This paper discusses various DoS attacks and the evolution towards distributed denial of service (DDoS) attacks. An analysis of high profile attacks will be conducted to evaluate the methods used by the attackers.
Alex Bartholemy, Weifeng Chen
openaire   +1 more source

A framework for countering denial of service attacks

2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 2005
Recent trend of the adversaries "if I can't have it, nobody can" has changed the emphasis of information assurance with respect to information availability. This paper presents a knowledge discovery framework to detect DoS attacks at the boundary controllers (routers).
Srinivas Mukkamala, Andrew H. Sung
openaire   +1 more source

Surviving Distributed Denial-of-Service Attacks

IT Professional, 2009
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response
openaire   +1 more source

A Framework for the Analysis of Denial of Service Attacks

The Computer Journal, 2004
We develop a framework for the analysis of Denial of Service (DoS) attacks in computer networks. In this framework, we identify the components and resources that collectively and in time, construct a service that may become unavailable due to the unavailability of those resources as a result of a DoS.
Ahmad R. Sharafat, Mehran S. Fallah
openaire   +1 more source

Denial of Service Attacks Mitigation in the Cloud

2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, 2015
Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability.
Wael Alosaimi   +2 more
openaire   +1 more source

Detecting Denial of Service Attacks in Tor

2009
Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided.
Norman Danner   +2 more
openaire   +1 more source

Mitigating denial of service attacks: A tutorial

Journal of Computer Security, 2005
This tutorial describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: a deployment and an attack phase.
openaire   +1 more source

Honeypots for distributed denial-of-service attacks

Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003
Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made, but none are successful by themselves. In this paper, we present a system that helps to defend a network from DDoS attacks.
openaire   +1 more source

Security Control of Multiagent Systems Under Denial-of-Service Attacks

IEEE Transactions on Cybernetics, 2022
Yaqi Wang, Jianquan Lu, Jinling Liang
exaly  

Home - About - Disclaimer - Privacy