Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Vulnerability of Network Mechanisms to Sophisticated Attacks

The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. In recent years we have witnessed a wave of DDoS attacks threatening the welfare of the internet. These are launched by malicious users whose pure incentive is to degrade the performance of other, innocent, users. The tr...

متن کامل

On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

Peacock and Cuckoo hashing schemes are currently the most studied implementations for hardware network systems such as NIDS, Firewalls, etc.. In this work we evaluate their vulnerability to sophisticated complexity Denial of Service (DoS) attacks. We show that an attacker can use insertion of carefully selected keys to hit the Peacock and Cuckoo hashing schemes at their weakest points. For the ...

متن کامل

A Study of DDOS Attacks, Tools and DDOS Defense Mechanisms

This paper proposes a study of distributed denial-of service attacks and a study of the defense mechanism that strive to counter these attacks. The attack illustrate do using both known and potential attack mechanisms along with this classification we discuss important feature .So each attack category that in turn define the challenge involved in combating these threats. Distributed Denial of S...

متن کامل

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms

This paper proposes a taxonomy of distributed denial-ofservice attacks and a taxonomy of the defense mechanisms that strive to counter these attacks. The attack taxonomy is illustrated using both known and potential attack mechanisms. Along with this classification we discuss important features of each attack category that in turn define the challenges involved in combating these threats. The d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computers

سال: 2013

ISSN: 0018-9340

DOI: 10.1109/tc.2012.49