نتایج جستجو برای: ddos

تعداد نتایج: 2088  

2012
Alexandru G. Bardas Loai Zomlot Sathya Chandran Sundaramurthy Xinming Ou S. Raj Rajagopalan Marc R. Eisenbarth

UDP traffic has recently been used extensively in flooding-based distributed denial of service (DDoS) attacks, most notably by those launched by the Anonymous group. Despite extensive past research in the general area of DDoS detection/prevention, the industry still lacks effective tools to deal with DDoS attacks leveraging UDP traffic. This paper presents our investigation into the proportiona...

Journal: :Comput. J. 2014
Monowar H. Bhuyan Hirak Kashyap Dhruba Kumar Bhattacharyya Jugal K. Kalita

The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of att...

2005
Guangsen Zhang Manish Parashar

Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) can not detect them accurately. As a result, defend DDoS attacks based on current available IDS will dramatically affect legitimate traffic. In this paper, we propose a distributed approach to def...

2012
R. Sukanesh

Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...

2013
Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht V. S. Subrahmanian Martial Hebert Katsushi Ikeuchi Bruno Siciliano Shui Yu

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...

Journal: :Computers & Security 2004
Li-Chiou Chen Thomas A. Longstaff Kathleen M. Carley

We propose a characterization of distributed denial-of-service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a framework for comparing the performance and deployment of DDOS defenses. We identify the characteristics in attack detection algorithms and attack responses by reviewing defenses that have appeared in the literature. ...

Journal: :Computer Communications 2015
Claude Fachkha Elias Bou-Harb Mourad Debbabi

This work proposes a novel approach to infer and characterize Internet-scale DNS Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده کامپیوتر و فناوری اطلاعات 1390

حملات ddos یکی از مهم ترین تهدیدات برای در دسترس بودن سرویس های اینترنت برای کاربران می باشد. در این نوع از حملات، مهاجم با استفاده از میلیون ها عامل تعداد بسیار زیادی بسته ایجاد کرده و به سیستم قربانی ارسال می کندو به این ترتیب تمام منابع محاسباتی و ارتباطی سیستم قربانی را در مدت زمان بسیار کوتاهی مصرف می کند. با این کار سیستم قربانی قادر به پاسخگویی به کاربران قانونی خود نخواهد بود. روش هایی ...

Journal: :Computer Networks 2004
Christos Douligeris Aikaterini Mitrokotsa

Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in today s Internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, a DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time...

2012
Jose Anand K. Sivachandar

The Internet has experienced a tremendous expansion in its size and complexity since its commercialization. Internet hosts are threatened by large-scale Distributed Denial-ofService (DDoS) attacks in the network. DDoS attacks typically rely on compromising a large number of hosts to generate traffic to a single destination node. Thus the severity of DDoS attacks will likely increase to the poss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید