نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

2005
Gerhard Münz Ali Fessi Georg Carle Yannick Carlinet Jan van Lunteren Patricia Sagmeister Gero Dittmann

High-profile web servers often become the victim of web server overload Distributed Denial-of-Service (DDoS) attacks. Motivations of such attacks range from technical challenge (e.g. script kiddies) to financial profit (e.g. blackmailing the web server’s owner). This paper presents the DIADEM Firewall architecture that allows an ISP to protect its customers from being the target of a DDoS attac...

2014
Xiaoxin Wu

Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any directi...

2014
G. Preetha B. S. Kiruthika Mercy Shalinie

Distributed Denial of Service (DDoS) attacks impinge on the availability of critical resources in the Internet domain. The objective of this paper is to develop an autonomous agent based DDoS defense in real time without human intervention. A mathematical model based on Lanchester law has been designed to examine the strength of DDoS attack and defense group. Once attack strength is formulated ...

2015
Rajender Nath

Cloud computing is a revolution in information technology industry due to its higher performance, accessibility, low cost and many other services compared to traditional online computing and storage methods. Cloud computing system can be easily intruded by various cyber attack such as DOS and DDOS attack. These attacks make cloud services unavailable to the legitimate users. In this paper a fil...

2017
Aditya Chopra

DDoS DDoS is distributed denial of service, or an attack that focuses on using the power of a large number of computers to deny users access to a particular service. This attack is powerful and can often bring down entire websites by hitting them with a large amount of traffic. It is difficult to defend against when the attacker is using a botnet because the machines are distributed across the ...

2008
Anjali Sardana R. C. Joshi

Distributed Denial of Service (DDoS) attacks can effect the steady functioning of any network, posing a severe security threat. Concentrated single source DDoS attacks consume huge resources like bandwidth in a very small duration and have direct impact at ISP level, thus making them easily detectable. In contrast, diluted low rate DDoS attacks lead to graceful degradation of network over a lon...

2012
Tae Hwan Kim Dong Seong Kim Sang Min Lee Joon Heo

This paper presents a novel source identification scheme for spoofed DDoS attacks using an image processing method. The key idea is that “DDoS attack traffic” that uses subnet spoofing is represented as “lines” on the spatial image planes, and they can be recognized by an edge detection algorithm. Applying the clustering technique to the lines makes it possible to identify multiple attack sourc...

2003
Jelena Mirkovic Gregory Prier Peter L. Reiher

A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the attack hinders detection; (b) defense systems must guarantee good service to legitimate traffic during the attack; and (c) deployment costs and false alarm levels must be sufficiently small and effectiveness must be h...

Journal: :Ad Hoc & Sensor Wireless Networks 2016
Qiao Yan Qingxiang Gong Fang'an Deng

Software Defined Networking (SDN) is a new network architecture that separates the control plane and the data plane and provides logically central control over the whole network. Because SDN controller combines the upper application layer and the underlying infrastructure layer, it may face the problem of single-point failure. If it is made unreachable by a Distributed Denial of Service (DDoS) ...

Journal: :CoRR 2003
Markus Jakobsson Filippo Menczer

We uncover a vulnerability that allows for an attacker to perform an email-based attack on selected victims, using only standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner — as is normally required to launch a DDoS attack. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید